Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-25629 (GCVE-0-2024-25629)
Vulnerability from cvelistv5
- CWE-127 - Buffer Under-read
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-23T19:18:11.897134Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:35:14.331Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.807Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
          },
          {
            "name": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "c-ares",
          "vendor": "c-ares",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.27.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-127",
              "description": "CWE-127: Buffer Under-read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-19T23:06:15.852Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        },
        {
          "name": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
        }
      ],
      "source": {
        "advisory": "GHSA-mg26-v6qh-x48q",
        "discovery": "UNKNOWN"
      },
      "title": "c-ares out of bounds read in ares__read_line()"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-25629",
    "datePublished": "2024-02-23T14:52:24.967Z",
    "dateReserved": "2024-02-08T22:26:33.512Z",
    "dateUpdated": "2025-02-13T17:40:51.243Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-25629\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-02-23T15:15:09.237\",\"lastModified\":\"2025-02-05T21:41:30.157\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.\"},{\"lang\":\"es\",\"value\":\"c-ares es una librer\u00eda C para solicitudes DNS asincr\u00f3nicas. `ares__read_line()` se usa para analizar archivos de configuraci\u00f3n locales como `/etc/resolv.conf`, `/etc/nsswitch.conf`, el archivo `HOSTALIASES` y si se usa una versi\u00f3n de c-ares anterior a 1.27. 0, el archivo `/etc/hosts`. Si alguno de estos archivos de configuraci\u00f3n tiene un car\u00e1cter \\\"NULL\\\" incrustado como primer car\u00e1cter en una nueva l\u00ednea, puede provocar que se intente leer la memoria antes del inicio del b\u00fafer dado, lo que puede provocar un bloqueo. Este problema se solucion\u00f3 en c-ares 1.27.0. No existen workarounds.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-127\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.27.0\",\"matchCriteriaId\":\"33B2994F-77FD-46CD-B5DC-9DD93A338656\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]}],\"references\":[{\"url\":\"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\", \"name\": \"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\", \"name\": \"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:44:09.807Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-25629\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-23T19:18:11.897134Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:13.149Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"c-ares out of bounds read in ares__read_line()\", \"source\": {\"advisory\": \"GHSA-mg26-v6qh-x48q\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"c-ares\", \"product\": \"c-ares\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.27.0\"}]}], \"references\": [{\"url\": \"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\", \"name\": \"https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\", \"name\": \"https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-127\", \"description\": \"CWE-127: Buffer Under-read\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-04-19T23:06:15.852Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-25629\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:40:51.243Z\", \"dateReserved\": \"2024-02-08T22:26:33.512Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-02-23T14:52:24.967Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  wid-sec-w-2024-0992
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Tenable Nessus Network Monitor ist ein Netzwerk\u00fcberwachungstool zur Inventarisierung und \u00dcberwachung von Netzwerkger\u00e4ten und den genutzten Protokollen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Tenable Security Nessus Network Monitor ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Dateien zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0992 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0992.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0992 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0992"
      },
      {
        "category": "external",
        "summary": "Nessus Security Advisories vom 2024-04-29",
        "url": "https://de.tenable.com/security/tns-2024-07"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2780 vom 2024-05-10",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2780.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2779 vom 2024-05-15",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2779.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2853 vom 2024-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:2853"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2910 vom 2024-05-23",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2910.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Tenable Security Nessus Network Monitor: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-05-22T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:08:17.980+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-0992",
      "initial_release_date": "2024-04-29T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-05-12T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-14T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-15T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-22T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        }
      ],
      "status": "final",
      "version": "5"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c6.4.0",
                "product": {
                  "name": "Tenable Security Nessus Network Monitor \u003c6.4.0",
                  "product_id": "T034461"
                }
              }
            ],
            "category": "product_name",
            "name": "Nessus Network Monitor"
          }
        ],
        "category": "vendor",
        "name": "Tenable Security"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-28711",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in den Drittanbieter-Komponenten Hyperscan Library und c-ares aufgrund eines unzureichenden Kontrollfluss-Managements und eines NULL-Zeiger-Dereferenz-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-28711"
    },
    {
      "cve": "CVE-2024-25629",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in den Drittanbieter-Komponenten Hyperscan Library und c-ares aufgrund eines unzureichenden Kontrollfluss-Managements und eines NULL-Zeiger-Dereferenz-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2024-25629"
    },
    {
      "cve": "CVE-2023-46218",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in der \"Curl\"-Komponente aufgrund einer unsachgem\u00e4\u00dfen Cookie-Behandlung und einer unsachgem\u00e4\u00dfen Neutralisierung von Eingaben. Dies erm\u00f6glicht es einer Website, Cookies zu setzen und sie an verschiedene und nicht verwandte Websites und Dom\u00e4nen zu senden oder beliebige Dateiinhalte zu l\u00f6schen, wenn HSTS-Daten gespeichert werden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder um Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in der \"Curl\"-Komponente aufgrund einer unsachgem\u00e4\u00dfen Cookie-Behandlung und einer unsachgem\u00e4\u00dfen Neutralisierung von Eingaben. Dies erm\u00f6glicht es einer Website, Cookies zu setzen und sie an verschiedene und nicht verwandte Websites und Dom\u00e4nen zu senden oder beliebige Dateiinhalte zu l\u00f6schen, wenn HSTS-Daten gespeichert werden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder um Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-46219"
    }
  ]
}
  WID-SEC-W-2024-0992
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Tenable Nessus Network Monitor ist ein Netzwerk\u00fcberwachungstool zur Inventarisierung und \u00dcberwachung von Netzwerkger\u00e4ten und den genutzten Protokollen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Tenable Security Nessus Network Monitor ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Dateien zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0992 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0992.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0992 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0992"
      },
      {
        "category": "external",
        "summary": "Nessus Security Advisories vom 2024-04-29",
        "url": "https://de.tenable.com/security/tns-2024-07"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2780 vom 2024-05-10",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2780.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2779 vom 2024-05-15",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2779.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2853 vom 2024-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:2853"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2910 vom 2024-05-23",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2910.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Tenable Security Nessus Network Monitor: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-05-22T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:08:17.980+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-0992",
      "initial_release_date": "2024-04-29T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-05-12T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-14T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-15T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-22T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        }
      ],
      "status": "final",
      "version": "5"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c6.4.0",
                "product": {
                  "name": "Tenable Security Nessus Network Monitor \u003c6.4.0",
                  "product_id": "T034461"
                }
              }
            ],
            "category": "product_name",
            "name": "Nessus Network Monitor"
          }
        ],
        "category": "vendor",
        "name": "Tenable Security"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-28711",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in den Drittanbieter-Komponenten Hyperscan Library und c-ares aufgrund eines unzureichenden Kontrollfluss-Managements und eines NULL-Zeiger-Dereferenz-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-28711"
    },
    {
      "cve": "CVE-2024-25629",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in den Drittanbieter-Komponenten Hyperscan Library und c-ares aufgrund eines unzureichenden Kontrollfluss-Managements und eines NULL-Zeiger-Dereferenz-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2024-25629"
    },
    {
      "cve": "CVE-2023-46218",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in der \"Curl\"-Komponente aufgrund einer unsachgem\u00e4\u00dfen Cookie-Behandlung und einer unsachgem\u00e4\u00dfen Neutralisierung von Eingaben. Dies erm\u00f6glicht es einer Website, Cookies zu setzen und sie an verschiedene und nicht verwandte Websites und Dom\u00e4nen zu senden oder beliebige Dateiinhalte zu l\u00f6schen, wenn HSTS-Daten gespeichert werden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder um Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in Tenable Security Nessus Network Monitor. Diese Fehler bestehen in der \"Curl\"-Komponente aufgrund einer unsachgem\u00e4\u00dfen Cookie-Behandlung und einer unsachgem\u00e4\u00dfen Neutralisierung von Eingaben. Dies erm\u00f6glicht es einer Website, Cookies zu setzen und sie an verschiedene und nicht verwandte Websites und Dom\u00e4nen zu senden oder beliebige Dateiinhalte zu l\u00f6schen, wenn HSTS-Daten gespeichert werden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder um Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T004914"
        ]
      },
      "release_date": "2024-04-29T22:00:00.000+00:00",
      "title": "CVE-2023-46219"
    }
  ]
}
  wid-sec-w-2024-1337
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "niedrig"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im \"c-ares\" Paket von Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1337 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1337.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1337 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1337"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2024-06-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:3842"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3842 vom 2024-06-13",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3842.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4249 vom 2024-07-03",
        "url": "https://access.redhat.com/errata/RHSA-2024:4249"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-4249 vom 2024-07-03",
        "url": "https://linux.oracle.com/errata/ELSA-2024-4249.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:4321"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4559 vom 2024-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:4559"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4721 vom 2024-07-23",
        "url": "https://access.redhat.com/errata/RHSA-2024:4721"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7168815 vom 2024-09-18",
        "url": "https://www.ibm.com/support/pages/node/7168815"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Enterprise Linux (c-ares): Schwachstelle erm\u00f6glicht Denial of Service",
    "tracking": {
      "current_release_date": "2024-09-17T22:00:00.000+00:00",
      "generator": {
        "date": "2024-09-18T11:09:51.032+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1337",
      "initial_release_date": "2024-06-11T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-06-11T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-07-02T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-03T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-16T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-23T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-09-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "8"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9 IF03",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03",
                  "product_id": "T037731"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9 IF03",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9 IF03",
                  "product_id": "T037731-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8",
                "product": {
                  "name": "Red Hat Enterprise Linux 8",
                  "product_id": "T034109",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9",
                "product": {
                  "name": "Red Hat Enterprise Linux 9",
                  "product_id": "T035291",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle im \"c-ares\" Paket von Red Hat Enterprise Linux. Durch spezielle Zeichen in bestimmten Konfigurationsdateien kann ein \"out of bounds read\" in der Funktion \"ares__read_line()\" ausgel\u00f6st werden. Ein lokaler Angreifer mit der Berechtigung diese Konfigurationsdateien zu bearbeiten kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T034109",
          "T035291",
          "T037731",
          "T004914"
        ]
      },
      "release_date": "2024-06-11T22:00:00.000+00:00",
      "title": "CVE-2024-25629"
    }
  ]
}
  WID-SEC-W-2024-1337
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "niedrig"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle im \"c-ares\" Paket von Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1337 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1337.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1337 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1337"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2024-06-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:3842"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3842 vom 2024-06-13",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3842.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4249 vom 2024-07-03",
        "url": "https://access.redhat.com/errata/RHSA-2024:4249"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-4249 vom 2024-07-03",
        "url": "https://linux.oracle.com/errata/ELSA-2024-4249.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:4321"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4559 vom 2024-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:4559"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4721 vom 2024-07-23",
        "url": "https://access.redhat.com/errata/RHSA-2024:4721"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7168815 vom 2024-09-18",
        "url": "https://www.ibm.com/support/pages/node/7168815"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Enterprise Linux (c-ares): Schwachstelle erm\u00f6glicht Denial of Service",
    "tracking": {
      "current_release_date": "2024-09-17T22:00:00.000+00:00",
      "generator": {
        "date": "2024-09-18T11:09:51.032+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1337",
      "initial_release_date": "2024-06-11T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-06-11T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-07-02T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-03T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-16T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-23T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-09-17T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "8"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9 IF03",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03",
                  "product_id": "T037731"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9 IF03",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9 IF03",
                  "product_id": "T037731-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8",
                "product": {
                  "name": "Red Hat Enterprise Linux 8",
                  "product_id": "T034109",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9",
                "product": {
                  "name": "Red Hat Enterprise Linux 9",
                  "product_id": "T035291",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle im \"c-ares\" Paket von Red Hat Enterprise Linux. Durch spezielle Zeichen in bestimmten Konfigurationsdateien kann ein \"out of bounds read\" in der Funktion \"ares__read_line()\" ausgel\u00f6st werden. Ein lokaler Angreifer mit der Berechtigung diese Konfigurationsdateien zu bearbeiten kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "67646",
          "T034109",
          "T035291",
          "T037731",
          "T004914"
        ]
      },
      "release_date": "2024-06-11T22:00:00.000+00:00",
      "title": "CVE-2024-25629"
    }
  ]
}
  rhsa-2024:4721
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4721",
        "url": "https://access.redhat.com/errata/RHSA-2024:4721"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4721.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:13+00:00",
      "generator": {
        "date": "2025-10-28T01:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4721",
      "initial_release_date": "2024-07-23T08:38:12+00:00",
      "revision_history": [
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.src",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-9.el9_0?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_2779
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2779",
        "url": "https://access.redhat.com/errata/RHSA-2024:2779"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2779.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:50:49+00:00",
      "generator": {
        "date": "2024-11-24T15:50:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2779",
      "initial_release_date": "2024-05-09T06:26:16+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:50:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs:18:9040020240422140329:rhel9",
                "product": {
                  "name": "nodejs:18:9040020240422140329:rhel9",
                  "product_id": "nodejs:18:9040020240422140329:rhel9",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/nodejs@18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
                  "product_id": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
        },
        "product_reference": "nodejs:18:9040020240422140329:rhel9",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch"
        },
        "product_reference": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64 as a component of nodejs:18:9040020240422140329:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240422140329:rhel9:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:3842
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3842",
        "url": "https://access.redhat.com/errata/RHSA-2024:3842"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3842.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:55:01+00:00",
      "generator": {
        "date": "2025-10-28T01:55:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:3842",
      "initial_release_date": "2024-06-11T19:37:03+00:00",
      "revision_history": [
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:55:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.src",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-11T19:37:03+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3842"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  rhsa-2024:2779
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2779",
        "url": "https://access.redhat.com/errata/RHSA-2024:2779"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2779.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2779",
      "initial_release_date": "2024-05-09T06:26:16+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=src\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=src\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch (nodejs:18)",
                  "product_id": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18"
        },
        "product_reference": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_2910
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2910",
        "url": "https://access.redhat.com/errata/RHSA-2024:2910"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2910.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:51:28+00:00",
      "generator": {
        "date": "2024-11-24T15:51:28+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2910",
      "initial_release_date": "2024-05-20T02:14:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:51:28+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.src",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-8.el9_4?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_4559
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4559",
        "url": "https://access.redhat.com/errata/RHSA-2024:4559"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4559.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:51:38+00:00",
      "generator": {
        "date": "2024-11-24T15:51:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:4559",
      "initial_release_date": "2024-07-16T12:49:03+00:00",
      "revision_history": [
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:51:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-6.el9_2.3?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    }
  ]
}
  rhsa-2024_2778
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2778",
        "url": "https://access.redhat.com/errata/RHSA-2024:2778"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2778.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:50:59+00:00",
      "generator": {
        "date": "2024-11-24T15:50:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2778",
      "initial_release_date": "2024-05-09T06:29:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:50:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs:20:8090020240422150739:a75119d5",
                "product": {
                  "name": "nodejs:20:8090020240422150739:a75119d5",
                  "product_id": "nodejs:20:8090020240422150739:a75119d5",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/nodejs@20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
        },
        "product_reference": "nodejs:20:8090020240422150739:a75119d5",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64 as a component of nodejs:20:8090020240422150739:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:20:8090020240422150739:a75119d5:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_4249
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nLow. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and\nprovides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4249",
        "url": "https://access.redhat.com/errata/RHSA-2024:4249"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4249.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:10:04+00:00",
      "generator": {
        "date": "2024-11-24T14:10:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:4249",
      "initial_release_date": "2024-07-02T15:40:18+00:00",
      "revision_history": [
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:10:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.src",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-02T15:40:18+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4249"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  rhsa-2024:2778
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2778",
        "url": "https://access.redhat.com/errata/RHSA-2024:2778"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2778.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2778",
      "initial_release_date": "2024-05-09T06:29:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=src\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=src\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=src\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch (nodejs:20)",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:2910
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2910",
        "url": "https://access.redhat.com/errata/RHSA-2024:2910"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2910.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:12+00:00",
      "generator": {
        "date": "2025-10-28T01:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2910",
      "initial_release_date": "2024-05-20T02:14:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.src",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-8.el9_4?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_4721
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4721",
        "url": "https://access.redhat.com/errata/RHSA-2024:4721"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4721.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:51:48+00:00",
      "generator": {
        "date": "2024-11-24T15:51:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:4721",
      "initial_release_date": "2024-07-23T08:38:12+00:00",
      "revision_history": [
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:51:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.src",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-9.el9_0?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:2779
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2779",
        "url": "https://access.redhat.com/errata/RHSA-2024:2779"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2779.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2779",
      "initial_release_date": "2024-05-09T06:26:16+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:26:16+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=src\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=src\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch (nodejs:18)",
                  "product_id": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.2.module%2Bel9.4.0%2B21742%2B692df1ea?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:9040020240422140329:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18"
        },
        "product_reference": "nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:26:16+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2779"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:18.20.2-2.module+el9.4.0+21742+692df1ea.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:18.20.2-2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.aarch64::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.ppc64le::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.s390x::nodejs:18",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_2780
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2780",
        "url": "https://access.redhat.com/errata/RHSA-2024:2780"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2780.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:51:08+00:00",
      "generator": {
        "date": "2024-11-24T15:51:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2780",
      "initial_release_date": "2024-05-09T06:30:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:51:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs:18:8090020240429131734:a75119d5",
                "product": {
                  "name": "nodejs:18:8090020240429131734:a75119d5",
                  "product_id": "nodejs:18:8090020240429131734:a75119d5",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/nodejs@18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
                  "product_id": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
        },
        "product_reference": "nodejs:18:8090020240429131734:a75119d5",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch"
        },
        "product_reference": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64 as a component of nodejs:18:8090020240429131734:a75119d5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
          "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x",
            "AppStream-8.9.0.Z.MAIN:nodejs:18:8090020240429131734:a75119d5:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:2780
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2780",
        "url": "https://access.redhat.com/errata/RHSA-2024:2780"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2780.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2780",
      "initial_release_date": "2024-05-09T06:30:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch (nodejs:18)",
                  "product_id": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18"
        },
        "product_reference": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:4721
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4721",
        "url": "https://access.redhat.com/errata/RHSA-2024:4721"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4721.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:13+00:00",
      "generator": {
        "date": "2025-10-28T01:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4721",
      "initial_release_date": "2024-07-23T08:38:12+00:00",
      "revision_history": [
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-23T08:38:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.src",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-9.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-9.el9_0?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-9.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-9.el9_0.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
          "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
          "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-23T08:38:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4721"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.src",
            "AppStream-9.0.0.Z.E4S:nodejs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-debugsource-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-docs-1:16.20.2-9.el9_0.noarch",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-full-i18n-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.i686",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:nodejs-libs-debuginfo-1:16.20.2-9.el9_0.x86_64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.aarch64",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.ppc64le",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.s390x",
            "AppStream-9.0.0.Z.E4S:npm-1:8.19.4-1.16.20.2.9.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024:2780
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2780",
        "url": "https://access.redhat.com/errata/RHSA-2024:2780"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2780.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:18 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2780",
      "initial_release_date": "2024-05-09T06:30:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:30:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=src\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=src\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch (nodejs:18)",
                  "product_id": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B21190%2B5ebd2c33?arch=noarch\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.2-1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                "product": {
                  "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18)",
                  "product_id": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.18.20.2.1.module%2Bel8.9.0%2B21767%2B537f34ee?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:18:8090020240429131734:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18"
        },
        "product_reference": "nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64 (nodejs:18) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        },
        "product_reference": "npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:30:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2780"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:18.20.2-1.module+el8.9.0+21767+537f34ee.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:18.20.2-1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.src::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+21190+5ebd2c33.noarch::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.aarch64::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.ppc64le::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.s390x::nodejs:18",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee.x86_64::nodejs:18"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024:4249
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nLow. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and\nprovides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4249",
        "url": "https://access.redhat.com/errata/RHSA-2024:4249"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4249.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:55:03+00:00",
      "generator": {
        "date": "2025-10-28T01:55:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4249",
      "initial_release_date": "2024-07-02T15:40:18+00:00",
      "revision_history": [
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:55:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.src",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-02T15:40:18+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4249"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  rhsa-2024:2910
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2910",
        "url": "https://access.redhat.com/errata/RHSA-2024:2910"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2910.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:12+00:00",
      "generator": {
        "date": "2025-10-28T01:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2910",
      "initial_release_date": "2024-05-20T02:14:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-20T02:14:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.src",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-8.el9_4?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-8.el9_4?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-8.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-8.el9_4.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-20T02:14:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2910"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:16.20.2-8.el9_4.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:16.20.2-8.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:8.19.4-1.16.20.2.8.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024:4559
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4559",
        "url": "https://access.redhat.com/errata/RHSA-2024:4559"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4559.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:13+00:00",
      "generator": {
        "date": "2025-10-28T01:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4559",
      "initial_release_date": "2024-07-16T12:49:03+00:00",
      "revision_history": [
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-6.el9_2.3?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    }
  ]
}
  rhsa-2024_2853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives\na detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2853",
        "url": "https://access.redhat.com/errata/RHSA-2024:2853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2853.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:51:18+00:00",
      "generator": {
        "date": "2024-11-24T15:51:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2853",
      "initial_release_date": "2024-05-15T11:35:08+00:00",
      "revision_history": [
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:51:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs:20:9040020240419140200:rhel9",
                "product": {
                  "name": "nodejs:20:9040020240419140200:rhel9",
                  "product_id": "nodejs:20:9040020240419140200:rhel9",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/nodejs@20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
        },
        "product_reference": "nodejs:20:9040020240419140200:rhel9",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64 as a component of nodejs:20:9040020240419140200:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240419140200:rhel9:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:2778
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2778",
        "url": "https://access.redhat.com/errata/RHSA-2024:2778"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2778.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:11+00:00",
      "generator": {
        "date": "2025-10-28T01:53:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2778",
      "initial_release_date": "2024-05-09T06:29:01+00:00",
      "revision_history": [
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-09T06:29:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=src\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=src\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=src\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch (nodejs:20)",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel8.9.0%2B21743%2B0b3f1be2?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:8090020240422150739:a75119d5"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
          "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-09T06:29:01+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2778"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debuginfo-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-debugsource-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-devel-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-docs-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-full-i18n-1:20.12.2-2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.aarch64::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.ppc64le::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.s390x::nodejs:20",
            "AppStream-8.9.0.Z.MAIN:npm-1:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:2853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives\na detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2853",
        "url": "https://access.redhat.com/errata/RHSA-2024:2853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2853.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:12+00:00",
      "generator": {
        "date": "2025-10-28T01:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2853",
      "initial_release_date": "2024-05-15T11:35:08+00:00",
      "revision_history": [
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=src\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=src\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=src\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch (nodejs:20)",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  RHSA-2024:4249
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nLow. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and\nprovides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4249",
        "url": "https://access.redhat.com/errata/RHSA-2024:4249"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4249.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:55:03+00:00",
      "generator": {
        "date": "2025-10-28T01:55:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4249",
      "initial_release_date": "2024-07-02T15:40:18+00:00",
      "revision_history": [
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-02T15:40:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:55:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.src",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_id": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.13.0-11.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.13.0-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.13.0-11.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-02T15:40:18+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4249"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-debugsource-0:1.13.0-11.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:c-ares-devel-0:1.13.0-11.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  rhsa-2024:3842
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3842",
        "url": "https://access.redhat.com/errata/RHSA-2024:3842"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3842.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:55:01+00:00",
      "generator": {
        "date": "2025-10-28T01:55:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:3842",
      "initial_release_date": "2024-06-11T19:37:03+00:00",
      "revision_history": [
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:55:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.src",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-11T19:37:03+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3842"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  RHSA-2024:4559
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:4559",
        "url": "https://access.redhat.com/errata/RHSA-2024:4559"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4559.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:13+00:00",
      "generator": {
        "date": "2025-10-28T01:53:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:4559",
      "initial_release_date": "2024-07-16T12:49:03+00:00",
      "revision_history": [
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-07-16T12:49:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-6.el9_2.3?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-6.el9_2.3?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
          "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
          "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-16T12:49:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:4559"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.src",
            "AppStream-9.2.0.Z.EUS:nodejs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-debugsource-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-docs-1:16.20.2-6.el9_2.3.noarch",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-full-i18n-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.i686",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-6.el9_2.3.x86_64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.aarch64",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.ppc64le",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.s390x",
            "AppStream-9.2.0.Z.EUS:npm-1:8.19.4-1.16.20.2.6.el9_2.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    }
  ]
}
  rhsa-2024:2853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives\na detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\n* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)\n\n* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)\n\n* nodejs: CONTINUATION frames DoS (CVE-2024-27983)\n\n* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2853",
        "url": "https://access.redhat.com/errata/RHSA-2024:2853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "external",
        "summary": "2268639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
      },
      {
        "category": "external",
        "summary": "2270559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
      },
      {
        "category": "external",
        "summary": "2272764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
      },
      {
        "category": "external",
        "summary": "2275392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2853.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs:20 security update",
    "tracking": {
      "current_release_date": "2025-10-28T01:53:12+00:00",
      "generator": {
        "date": "2025-10-28T01:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:2853",
      "initial_release_date": "2024-05-15T11:35:08+00:00",
      "revision_history": [
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-15T11:35:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-28T01:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=src\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=src\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=src\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch (nodejs:20)",
                  "product_id": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch (nodejs:20)",
                  "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                "product": {
                  "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20)",
                  "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-devel@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.12.2-2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                "product": {
                  "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20)",
                  "product_id": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@10.5.0-1.20.12.2.2.module%2Bel9.4.0%2B21731%2B46b5b8a7?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:20:9040020240419140200:rhel9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20"
        },
        "product_reference": "nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20"
        },
        "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20"
        },
        "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20"
        },
        "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64 (nodejs:20) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        },
        "product_reference": "npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-03-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2270559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Node.js that allows a denial of service attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fetch() function in Node.js that always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. This flaw allows an attacker to control the URL passed into fetch() to exhaust memory, potentially leading to process termination, depending on the system configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The identified flaw in Node.js, which involves the fetch() function always decoding Brotli content regardless of its source, represents a moderate severity issue due to its potential to facilitate denial of service attacks through resource exhaustion. This vulnerability allows malicious actors to manipulate the URL parameter passed into fetch(), exploiting the consistent Brotli decoding behavior to overwhelm system memory resources. While the impact is constrained to process termination, its severity is moderated by the requirement for specific conditions, such as untrusted URLs and system configurations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "RHBZ#2270559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22025",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22025"
        }
      ],
      "release_date": "2024-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service"
    },
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2024-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2275392"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Content Length Obfuscation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The HTTP request smuggling vulnerability in Node.js, stemming from Content-Length header obfuscation, is categorized as moderate severity due to its potential impact on the security and integrity of web applications. While the vulnerability can allow for the smuggling of secondary HTTP requests, leading to potential bypassing of security controls and injection of malicious content, its exploitation requires specific conditions and configurations to be met. Successful exploitation relies on the server\u0027s handling of malformed headers and the presence of web caching mechanisms susceptible to poisoning. Though the risk is notable and could facilitate attacks like XSS and cache poisoning, its moderate severity status suggests that while it warrants attention and mitigation, it might not pose an immediate, widespread threat under all circumstances.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "RHBZ#2275392",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27982",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27982"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Content Length Obfuscation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272764"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272764",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27983",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27983"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases",
          "url": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: CONTINUATION frames DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Bartek Nowotarski"
          ],
          "organization": "nowotarski.info"
        }
      ],
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "discovery_date": "2024-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268639"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nghttp2: CONTINUATION frames DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
          "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268639",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268639"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28182",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182"
        },
        {
          "category": "external",
          "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
          "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"
        },
        {
          "category": "external",
          "summary": "https://nowotarski.info/http2-continuation-flood/",
          "url": "https://nowotarski.info/http2-continuation-flood/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/421644",
          "url": "https://www.kb.cert.org/vuls/id/421644"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-15T11:35:08+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2853"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debuginfo-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-debugsource-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-devel-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-docs-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-full-i18n-1:20.12.2-2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.aarch64::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.ppc64le::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.s390x::nodejs:20",
            "AppStream-9.4.0.Z.MAIN.EUS:npm-1:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7.x86_64::nodejs:20"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nghttp2: CONTINUATION frames DoS"
    }
  ]
}
  rhsa-2024_3842
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for c-ares is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.\n\nSecurity Fix(es):\n\n* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3842",
        "url": "https://access.redhat.com/errata/RHSA-2024:3842"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2265713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3842.json"
      }
    ],
    "title": "Red Hat Security Advisory: c-ares security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:09:52+00:00",
      "generator": {
        "date": "2024-11-24T14:09:52+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3842",
      "initial_release_date": "2024-06-11T19:37:03+00:00",
      "revision_history": [
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-06-11T19:37:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:09:52+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.i686",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-devel@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debugsource@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares-debuginfo@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-0:1.19.1-2.el9_4.src",
                "product": {
                  "name": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_id": "c-ares-0:1.19.1-2.el9_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/c-ares@1.19.1-2.el9_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.src",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.aarch64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.i686",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.s390x",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-0:1.19.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        },
        "product_reference": "c-ares-devel-0:1.19.1-2.el9_4.x86_64",
        "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-127",
        "name": "Buffer Under-read"
      },
      "discovery_date": "2024-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2265713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in c-ares where the ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.22.0, the /etc/hosts file. If the configuration files have an embedded NULL character as the first character in a new line, it can attempt to read memory before the start of the given buffer, which may result in a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: Out of bounds read in ares__read_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat considers this a Low impact since this issue requires a specific configuration file to be configured incorrectly, meaning an attacker would need access to this configuration file to impact the server. This would normally correspond to an already compromised environment.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
          "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "RHBZ#2265713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25629",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
          "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
        }
      ],
      "release_date": "2024-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-11T19:37:03+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3842"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.src",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debuginfo-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-debugsource-0:1.19.1-2.el9_4.x86_64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.aarch64",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.i686",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.ppc64le",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.s390x",
            "BaseOS-9.4.0.Z.MAIN.EUS:c-ares-devel-0:1.19.1-2.el9_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "c-ares: Out of bounds read in ares__read_line()"
    }
  ]
}
  opensuse-su-2024:13722-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "c-ares-devel-1.27.0-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the c-ares-devel-1.27.0-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13722",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13722-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-25629 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-25629/"
      }
    ],
    "title": "c-ares-devel-1.27.0-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13722-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.27.0-1.1.aarch64",
                "product": {
                  "name": "c-ares-devel-1.27.0-1.1.aarch64",
                  "product_id": "c-ares-devel-1.27.0-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.27.0-1.1.aarch64",
                "product": {
                  "name": "c-ares-utils-1.27.0-1.1.aarch64",
                  "product_id": "c-ares-utils-1.27.0-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.27.0-1.1.aarch64",
                "product": {
                  "name": "libcares2-1.27.0-1.1.aarch64",
                  "product_id": "libcares2-1.27.0-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.27.0-1.1.aarch64",
                "product": {
                  "name": "libcares2-32bit-1.27.0-1.1.aarch64",
                  "product_id": "libcares2-32bit-1.27.0-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.27.0-1.1.ppc64le",
                "product": {
                  "name": "c-ares-devel-1.27.0-1.1.ppc64le",
                  "product_id": "c-ares-devel-1.27.0-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.27.0-1.1.ppc64le",
                "product": {
                  "name": "c-ares-utils-1.27.0-1.1.ppc64le",
                  "product_id": "c-ares-utils-1.27.0-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.27.0-1.1.ppc64le",
                "product": {
                  "name": "libcares2-1.27.0-1.1.ppc64le",
                  "product_id": "libcares2-1.27.0-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.27.0-1.1.ppc64le",
                "product": {
                  "name": "libcares2-32bit-1.27.0-1.1.ppc64le",
                  "product_id": "libcares2-32bit-1.27.0-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.27.0-1.1.s390x",
                "product": {
                  "name": "c-ares-devel-1.27.0-1.1.s390x",
                  "product_id": "c-ares-devel-1.27.0-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.27.0-1.1.s390x",
                "product": {
                  "name": "c-ares-utils-1.27.0-1.1.s390x",
                  "product_id": "c-ares-utils-1.27.0-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.27.0-1.1.s390x",
                "product": {
                  "name": "libcares2-1.27.0-1.1.s390x",
                  "product_id": "libcares2-1.27.0-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.27.0-1.1.s390x",
                "product": {
                  "name": "libcares2-32bit-1.27.0-1.1.s390x",
                  "product_id": "libcares2-32bit-1.27.0-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.27.0-1.1.x86_64",
                "product": {
                  "name": "c-ares-devel-1.27.0-1.1.x86_64",
                  "product_id": "c-ares-devel-1.27.0-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.27.0-1.1.x86_64",
                "product": {
                  "name": "c-ares-utils-1.27.0-1.1.x86_64",
                  "product_id": "c-ares-utils-1.27.0-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.27.0-1.1.x86_64",
                "product": {
                  "name": "libcares2-1.27.0-1.1.x86_64",
                  "product_id": "libcares2-1.27.0-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.27.0-1.1.x86_64",
                "product": {
                  "name": "libcares2-32bit-1.27.0-1.1.x86_64",
                  "product_id": "libcares2-32bit-1.27.0-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.27.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.aarch64"
        },
        "product_reference": "c-ares-devel-1.27.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.27.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.ppc64le"
        },
        "product_reference": "c-ares-devel-1.27.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.27.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.s390x"
        },
        "product_reference": "c-ares-devel-1.27.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.27.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.x86_64"
        },
        "product_reference": "c-ares-devel-1.27.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.27.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.aarch64"
        },
        "product_reference": "c-ares-utils-1.27.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.27.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.ppc64le"
        },
        "product_reference": "c-ares-utils-1.27.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.27.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.s390x"
        },
        "product_reference": "c-ares-utils-1.27.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.27.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.x86_64"
        },
        "product_reference": "c-ares-utils-1.27.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.27.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-1.27.0-1.1.aarch64"
        },
        "product_reference": "libcares2-1.27.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.27.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-1.27.0-1.1.ppc64le"
        },
        "product_reference": "libcares2-1.27.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.27.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-1.27.0-1.1.s390x"
        },
        "product_reference": "libcares2-1.27.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.27.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-1.27.0-1.1.x86_64"
        },
        "product_reference": "libcares2-1.27.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.27.0-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.aarch64"
        },
        "product_reference": "libcares2-32bit-1.27.0-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.27.0-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.ppc64le"
        },
        "product_reference": "libcares2-32bit-1.27.0-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.27.0-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.s390x"
        },
        "product_reference": "libcares2-32bit-1.27.0-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.27.0-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.x86_64"
        },
        "product_reference": "libcares2-32bit-1.27.0-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-25629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.aarch64",
          "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.ppc64le",
          "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.s390x",
          "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.x86_64",
          "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.aarch64",
          "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.ppc64le",
          "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.s390x",
          "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.x86_64",
          "openSUSE Tumbleweed:libcares2-1.27.0-1.1.aarch64",
          "openSUSE Tumbleweed:libcares2-1.27.0-1.1.ppc64le",
          "openSUSE Tumbleweed:libcares2-1.27.0-1.1.s390x",
          "openSUSE Tumbleweed:libcares2-1.27.0-1.1.x86_64",
          "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.aarch64",
          "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.ppc64le",
          "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.s390x",
          "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-25629",
          "url": "https://www.suse.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220279 for CVE-2024-25629",
          "url": "https://bugzilla.suse.com/1220279"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:c-ares-devel-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:c-ares-utils-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:libcares2-1.27.0-1.1.x86_64",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.aarch64",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.ppc64le",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.s390x",
            "openSUSE Tumbleweed:libcares2-32bit-1.27.0-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-25629"
    }
  ]
}
  CERTFR-2025-AVI-0150
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Identity Exposure. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.9 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.9",
      "product": {
        "name": "Identity Exposure",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-1091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2025-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-02-21T00:00:00",
  "last_revision_date": "2025-02-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0150",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Identity Exposure. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Identity Exposure",
  "vendor_advisories": [
    {
      "published_at": "2025-02-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
      "url": "https://www.tenable.com/security/tns-2025-01"
    }
  ]
}
  CERTFR-2025-AVI-0855
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 24.4 antérieures à 24.4R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 22.4R3-S8-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4 antérieures à 23.4R2-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 22.4R3-S8 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.4-EVO antérieures à 24.4R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R4 | ||
| Juniper Networks | Security Director | Security Director Policy Enforcer versions antérieures à 23.1R1 Hotpatch v3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2 antérieures à 23.2R2-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2 antérieures à 24.2R2-S1 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions  ant\u00e9rieures \u00e0 22.4R3-S8-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R4",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3",
      "product": {
        "name": "Security Director",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
    },
    {
      "name": "CVE-2024-36903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
    },
    {
      "name": "CVE-2023-44431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44431"
    },
    {
      "name": "CVE-2021-47606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
    },
    {
      "name": "CVE-2025-59993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59993"
    },
    {
      "name": "CVE-2025-59997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59997"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2025-59995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59995"
    },
    {
      "name": "CVE-2024-21235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
    },
    {
      "name": "CVE-2023-28466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
    },
    {
      "name": "CVE-2024-36921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
    },
    {
      "name": "CVE-2025-59986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59986"
    },
    {
      "name": "CVE-2025-60009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60009"
    },
    {
      "name": "CVE-2025-59989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59989"
    },
    {
      "name": "CVE-2024-26897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
    },
    {
      "name": "CVE-2023-46103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
    },
    {
      "name": "CVE-2024-27052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
    },
    {
      "name": "CVE-2023-2235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
    },
    {
      "name": "CVE-2025-59999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59999"
    },
    {
      "name": "CVE-2025-59994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59994"
    },
    {
      "name": "CVE-2024-4076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
    },
    {
      "name": "CVE-2025-59967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59967"
    },
    {
      "name": "CVE-2022-24805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2023-3390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
    },
    {
      "name": "CVE-2024-37356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
    },
    {
      "name": "CVE-2024-47538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
    },
    {
      "name": "CVE-2023-4004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
    },
    {
      "name": "CVE-2024-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
    },
    {
      "name": "CVE-2025-59991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59991"
    },
    {
      "name": "CVE-2024-5564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
    },
    {
      "name": "CVE-2024-26600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
    },
    {
      "name": "CVE-2023-28746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
    },
    {
      "name": "CVE-2023-52864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
    },
    {
      "name": "CVE-2025-26600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26600"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-27280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
    },
    {
      "name": "CVE-2024-36929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2025-59982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59982"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2023-43785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
    },
    {
      "name": "CVE-2024-30205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
    },
    {
      "name": "CVE-2018-17247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17247"
    },
    {
      "name": "CVE-2025-60004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60004"
    },
    {
      "name": "CVE-2023-51594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51594"
    },
    {
      "name": "CVE-2024-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
    },
    {
      "name": "CVE-2023-50229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50229"
    },
    {
      "name": "CVE-2025-59974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59974"
    },
    {
      "name": "CVE-2025-26598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26598"
    },
    {
      "name": "CVE-2018-3824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
    },
    {
      "name": "CVE-2024-40928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
    },
    {
      "name": "CVE-2024-43398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
    },
    {
      "name": "CVE-2024-8508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
    },
    {
      "name": "CVE-2024-36020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
    },
    {
      "name": "CVE-2021-45105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
    },
    {
      "name": "CVE-2025-59981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59981"
    },
    {
      "name": "CVE-2023-31248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2021-4104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
    },
    {
      "name": "CVE-2024-30203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
    },
    {
      "name": "CVE-2023-3090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
    },
    {
      "name": "CVE-2024-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
    },
    {
      "name": "CVE-2025-59968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59968"
    },
    {
      "name": "CVE-2023-51592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51592"
    },
    {
      "name": "CVE-2025-59990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59990"
    },
    {
      "name": "CVE-2021-22146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22146"
    },
    {
      "name": "CVE-2025-59978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59978"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-36017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
    },
    {
      "name": "CVE-2024-24806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
    },
    {
      "name": "CVE-2024-27434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2024-35852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
    },
    {
      "name": "CVE-2024-38558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
    },
    {
      "name": "CVE-2025-59992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59992"
    },
    {
      "name": "CVE-2024-35845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
    },
    {
      "name": "CVE-2021-41072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
    },
    {
      "name": "CVE-2025-60000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60000"
    },
    {
      "name": "CVE-2022-24807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
    },
    {
      "name": "CVE-2024-47607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
    },
    {
      "name": "CVE-2024-27065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
    },
    {
      "name": "CVE-2024-36005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
    },
    {
      "name": "CVE-2023-45866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45866"
    },
    {
      "name": "CVE-2023-27349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27349"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2015-5377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5377"
    },
    {
      "name": "CVE-2023-48161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
    },
    {
      "name": "CVE-2022-24810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
    },
    {
      "name": "CVE-2024-33621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
    },
    {
      "name": "CVE-2024-27983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
    },
    {
      "name": "CVE-2025-60001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60001"
    },
    {
      "name": "CVE-2024-5742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
    },
    {
      "name": "CVE-2023-50230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50230"
    },
    {
      "name": "CVE-2025-52960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52960"
    },
    {
      "name": "CVE-2024-36922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
    },
    {
      "name": "CVE-2025-59996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59996"
    },
    {
      "name": "CVE-2024-39487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
    },
    {
      "name": "CVE-2024-27982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
    },
    {
      "name": "CVE-2023-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
    },
    {
      "name": "CVE-2024-35911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35911"
    },
    {
      "name": "CVE-2025-59957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59957"
    },
    {
      "name": "CVE-2025-59958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59958"
    },
    {
      "name": "CVE-2021-41043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
    },
    {
      "name": "CVE-2018-17244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17244"
    },
    {
      "name": "CVE-2019-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
    },
    {
      "name": "CVE-2024-39908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
    },
    {
      "name": "CVE-2025-26597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26597"
    },
    {
      "name": "CVE-2024-36971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2024-41946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
    },
    {
      "name": "CVE-2023-3776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "name": "CVE-2024-42934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42934"
    },
    {
      "name": "CVE-2023-51580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51580"
    },
    {
      "name": "CVE-2024-35848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
    },
    {
      "name": "CVE-2024-27417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
    },
    {
      "name": "CVE-2023-21102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21102"
    },
    {
      "name": "CVE-2024-27281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
    },
    {
      "name": "CVE-2025-59983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59983"
    },
    {
      "name": "CVE-2024-36941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-35969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
    },
    {
      "name": "CVE-2021-45046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
    },
    {
      "name": "CVE-2025-60006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60006"
    },
    {
      "name": "CVE-2024-36489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
    },
    {
      "name": "CVE-2015-1427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-1427"
    },
    {
      "name": "CVE-2024-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
    },
    {
      "name": "CVE-2024-35899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
    },
    {
      "name": "CVE-2024-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
    },
    {
      "name": "CVE-2024-40954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
    },
    {
      "name": "CVE-2024-9632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
    },
    {
      "name": "CVE-2023-38408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
    },
    {
      "name": "CVE-2025-26595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26595"
    },
    {
      "name": "CVE-2024-26868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26868"
    },
    {
      "name": "CVE-2023-43787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
    },
    {
      "name": "CVE-2023-43786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
    },
    {
      "name": "CVE-2024-8235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8235"
    },
    {
      "name": "CVE-2023-4147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4147"
    },
    {
      "name": "CVE-2025-59977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59977"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2023-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3610"
    },
    {
      "name": "CVE-2025-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26596"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2022-48622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48622"
    },
    {
      "name": "CVE-2021-42550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
    },
    {
      "name": "CVE-2021-44228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
    },
    {
      "name": "CVE-2024-26828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
    },
    {
      "name": "CVE-2025-59998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59998"
    },
    {
      "name": "CVE-2024-26808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
    },
    {
      "name": "CVE-2024-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
    },
    {
      "name": "CVE-2025-60002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60002"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2024-27282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
    },
    {
      "name": "CVE-2018-3831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3831"
    },
    {
      "name": "CVE-2023-43490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
    },
    {
      "name": "CVE-2025-59976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59976"
    },
    {
      "name": "CVE-2025-59980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59980"
    },
    {
      "name": "CVE-2025-26599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26599"
    },
    {
      "name": "CVE-2024-47615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
    },
    {
      "name": "CVE-2018-3823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3823"
    },
    {
      "name": "CVE-2023-22655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
    },
    {
      "name": "CVE-2024-6126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6126"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-39368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
    },
    {
      "name": "CVE-2021-44832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
    },
    {
      "name": "CVE-2024-26853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
    },
    {
      "name": "CVE-2025-59975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59975"
    },
    {
      "name": "CVE-2025-0624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
    },
    {
      "name": "CVE-2025-59987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59987"
    },
    {
      "name": "CVE-2024-40958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
    },
    {
      "name": "CVE-2018-3826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3826"
    },
    {
      "name": "CVE-2025-26601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26601"
    },
    {
      "name": "CVE-2024-52337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
    },
    {
      "name": "CVE-2025-59985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59985"
    },
    {
      "name": "CVE-2025-11198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11198"
    },
    {
      "name": "CVE-2022-24806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
    },
    {
      "name": "CVE-2023-32233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
    },
    {
      "name": "CVE-2024-35789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
    },
    {
      "name": "CVE-2024-26327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26327"
    },
    {
      "name": "CVE-2015-3253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3253"
    },
    {
      "name": "CVE-2025-59964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59964"
    },
    {
      "name": "CVE-2025-59988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59988"
    },
    {
      "name": "CVE-2024-21210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2024-34397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
    },
    {
      "name": "CVE-2023-45733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
    },
    {
      "name": "CVE-2021-40153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
    },
    {
      "name": "CVE-2024-6655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6655"
    },
    {
      "name": "CVE-2024-41123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
    },
    {
      "name": "CVE-2024-27049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27049"
    },
    {
      "name": "CVE-2025-59984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59984"
    },
    {
      "name": "CVE-2025-52961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52961"
    },
    {
      "name": "CVE-2023-51589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51589"
    },
    {
      "name": "CVE-2024-21217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2021-3903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3903"
    },
    {
      "name": "CVE-2024-35800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35800"
    },
    {
      "name": "CVE-2023-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
    },
    {
      "name": "CVE-2023-51596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51596"
    },
    {
      "name": "CVE-2025-60010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60010"
    },
    {
      "name": "CVE-2023-51764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51764"
    },
    {
      "name": "CVE-2025-26594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26594"
    },
    {
      "name": "CVE-2024-6409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6409"
    },
    {
      "name": "CVE-2024-49761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
    },
    {
      "name": "CVE-2022-24808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
    },
    {
      "name": "CVE-2025-59962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59962"
    },
    {
      "name": "CVE-2024-21208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2024-40961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
    }
  ],
  "initial_release_date": "2025-10-09T00:00:00",
  "last_revision_date": "2025-10-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0855",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
  "vendor_advisories": [
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
    },
    {
      "published_at": "2025-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165",
      "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004"
    }
  ]
}
  CERTFR-2024-AVI-0741
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-29483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
    },
    {
      "name": "CVE-2024-42472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
    },
    {
      "name": "CVE-2024-26934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
    },
    {
      "name": "CVE-2023-52477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
    },
    {
      "name": "CVE-2023-52675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
    },
    {
      "name": "CVE-2023-4692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
    },
    {
      "name": "CVE-2024-27059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
    },
    {
      "name": "CVE-2024-26656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2023-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
    },
    {
      "name": "CVE-2024-26974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
    },
    {
      "name": "CVE-2024-26897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
    },
    {
      "name": "CVE-2021-47055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
    },
    {
      "name": "CVE-2020-36777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
    },
    {
      "name": "CVE-2023-43788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43788"
    },
    {
      "name": "CVE-2024-27052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-26585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
    },
    {
      "name": "CVE-2024-25744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
    },
    {
      "name": "CVE-2024-26973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-27397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
    },
    {
      "name": "CVE-2024-35854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
    },
    {
      "name": "CVE-2023-52878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
    },
    {
      "name": "CVE-2021-47185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
    },
    {
      "name": "CVE-2024-23650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
    },
    {
      "name": "CVE-2024-26603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
    },
    {
      "name": "CVE-2024-26964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
    },
    {
      "name": "CVE-2024-5564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
    },
    {
      "name": "CVE-2021-33198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
    },
    {
      "name": "CVE-2024-26993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
    },
    {
      "name": "CVE-2019-25162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2023-39321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
    },
    {
      "name": "CVE-2024-3933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2023-52669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2022-3287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
    },
    {
      "name": "CVE-2024-36004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
    },
    {
      "name": "CVE-2024-26859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
    },
    {
      "name": "CVE-2020-13936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-35959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
    },
    {
      "name": "CVE-2018-20060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
    },
    {
      "name": "CVE-2024-35855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-3652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
    },
    {
      "name": "CVE-2024-26615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
    },
    {
      "name": "CVE-2023-45802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
    },
    {
      "name": "CVE-2024-26801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
    },
    {
      "name": "CVE-2024-36007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
    },
    {
      "name": "CVE-2021-47311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
    },
    {
      "name": "CVE-2023-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
    },
    {
      "name": "CVE-2024-26643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
    },
    {
      "name": "CVE-2024-26779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
    },
    {
      "name": "CVE-2024-32021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-24806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
    },
    {
      "name": "CVE-2024-35852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
    },
    {
      "name": "CVE-2024-23307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2023-52528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
    },
    {
      "name": "CVE-2024-27048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
    },
    {
      "name": "CVE-2021-47013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
    },
    {
      "name": "CVE-2023-52781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
    },
    {
      "name": "CVE-2024-35845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
    },
    {
      "name": "CVE-2021-41072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2021-47073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2024-26593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
    },
    {
      "name": "CVE-2022-48627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
    },
    {
      "name": "CVE-2021-47171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
    },
    {
      "name": "CVE-2024-26743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
    },
    {
      "name": "CVE-2023-52686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
    },
    {
      "name": "CVE-2021-47236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2023-6240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
    },
    {
      "name": "CVE-2024-32004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
    },
    {
      "name": "CVE-2021-47118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
    },
    {
      "name": "CVE-2024-35890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-52877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-32020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-32487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
    },
    {
      "name": "CVE-2024-26826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
    },
    {
      "name": "CVE-2024-27056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
    },
    {
      "name": "CVE-2024-26583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
    },
    {
      "name": "CVE-2024-26642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
    },
    {
      "name": "CVE-2021-47153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
    },
    {
      "name": "CVE-2024-35888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
    },
    {
      "name": "CVE-2023-52700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
    },
    {
      "name": "CVE-2023-31122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
    },
    {
      "name": "CVE-2023-52439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
    },
    {
      "name": "CVE-2021-47495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
    },
    {
      "name": "CVE-2024-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
    },
    {
      "name": "CVE-2019-14865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14865"
    },
    {
      "name": "CVE-2024-26906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
    },
    {
      "name": "CVE-2024-26610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
    },
    {
      "name": "CVE-2024-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
    },
    {
      "name": "CVE-2024-26584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-26919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
    },
    {
      "name": "CVE-2023-52445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-3019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2024-27014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
    },
    {
      "name": "CVE-2021-34558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
    },
    {
      "name": "CVE-2024-32465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2023-43789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43789"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-26892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
    },
    {
      "name": "CVE-2024-35835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
    },
    {
      "name": "CVE-2024-26735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
    },
    {
      "name": "CVE-2023-52881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
    },
    {
      "name": "CVE-2023-4693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
    },
    {
      "name": "CVE-2021-46972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
    },
    {
      "name": "CVE-2023-52578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-34750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2021-46934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
    },
    {
      "name": "CVE-2024-1048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2023-52598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-26659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
    },
    {
      "name": "CVE-2023-52667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
    },
    {
      "name": "CVE-2024-26933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-52703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
    },
    {
      "name": "CVE-2023-52594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
    },
    {
      "name": "CVE-2024-26693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
    },
    {
      "name": "CVE-2023-52595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2023-45287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
    },
    {
      "name": "CVE-2022-48624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
    },
    {
      "name": "CVE-2024-26759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
    },
    {
      "name": "CVE-2023-52464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
    },
    {
      "name": "CVE-2023-52813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
    },
    {
      "name": "CVE-2024-35838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
    },
    {
      "name": "CVE-2023-52513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
    },
    {
      "name": "CVE-2023-52615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
    },
    {
      "name": "CVE-2023-52610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
    },
    {
      "name": "CVE-2023-52560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2023-39322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
    },
    {
      "name": "CVE-2023-52606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
    },
    {
      "name": "CVE-2021-47069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
    },
    {
      "name": "CVE-2024-35960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
    },
    {
      "name": "CVE-2022-39253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2024-26872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
    },
    {
      "name": "CVE-2020-26555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
    },
    {
      "name": "CVE-2024-26901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2024-35789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
    },
    {
      "name": "CVE-2023-52835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2021-47310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
    },
    {
      "name": "CVE-2023-52626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
    },
    {
      "name": "CVE-2024-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
    },
    {
      "name": "CVE-2024-26744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2024-35958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
    },
    {
      "name": "CVE-2021-47456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
    },
    {
      "name": "CVE-2021-40153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
    },
    {
      "name": "CVE-2024-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
    },
    {
      "name": "CVE-2022-48669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
    },
    {
      "name": "CVE-2023-52565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
    },
    {
      "name": "CVE-2023-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
    },
    {
      "name": "CVE-2021-47356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
    },
    {
      "name": "CVE-2024-26694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-26664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2021-47353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2023-52607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2018-25091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
    },
    {
      "name": "CVE-2023-5090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
    },
    {
      "name": "CVE-2024-27410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
    },
    {
      "name": "CVE-2021-46909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
    },
    {
      "name": "CVE-2024-35853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
    },
    {
      "name": "CVE-2024-26907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
    }
  ],
  "initial_release_date": "2024-09-05T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0741",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-05T00:00:00.000000"
    },
    {
      "description": "Ajout r\u00e9f\u00e9rence \u00e9diteur",
      "revision_date": "2024-09-06T00:00:00.000000"
    },
    {
      "description": "Correction d\u0027identifiants CVE erron\u00e9s",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
  "vendor_advisories": [
    {
      "published_at": "2024-09-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686",
      "url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02"
    }
  ]
}
  CERTFR-2025-AVI-0102
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.8 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.8",
      "product": {
        "name": "Identity Exposure",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-1091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2025-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-02-07T00:00:00",
  "last_revision_date": "2025-02-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0102",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-07T00:00:00.000000"
    },
    {
      "description": "Ajout des vuln\u00e9rabilit\u00e9s CVE-2025-0167, CVE-2025-0665 et CVE-2025-0725",
      "revision_date": "2025-02-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Tenable. Entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
  "vendor_advisories": [
    {
      "published_at": "2025-02-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
      "url": "https://www.tenable.com/security/tns-2025-01"
    }
  ]
}
  CERTFR-2024-AVI-0692
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.10 | ||
| IBM | WebSphere | IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions antérieures à 8 Service Refresh 8 FP30 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.2.x à 7.5.x antérieures à 7.5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | QRadar SIEM | QRadar Suite versions 1.10.x antérieures à 1.10.24.0 | ||
| IBM | VIOS | VIOS version 4.1 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x antérieures à 8.5.5.11 ou sans le correctif de sécurité temporaire PH62458 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.2.x antérieures à 6.2.1.0 GA iFix13 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 GA iFix02 | ||
| IBM | Cognos Analytics | Cognos Dashboards on Cloud Pak for Data versions antérieures à 5.0.0 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.10",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions ant\u00e9rieures \u00e0 8 Service Refresh 8 FP30",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Db2 Big SQL on Cloud Pak for Data versions 7.2.x \u00e0 7.5.x ant\u00e9rieures \u00e0 7.5.3",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Db2 versions 11.5.x sans le dernier correctif de s\u00e9curit\u00e9 ",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite versions 1.10.x ant\u00e9rieures \u00e0 1.10.24.0",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.11 ou sans le correctif de s\u00e9curit\u00e9 temporaire PH62458",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.2.x ant\u00e9rieures \u00e0 6.2.1.0 GA iFix13",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 GA iFix02",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.0.0",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-21144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
    },
    {
      "name": "CVE-2023-23613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2023-21939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
    },
    {
      "name": "CVE-2024-39008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2024-22353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
    },
    {
      "name": "CVE-2023-29256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
    },
    {
      "name": "CVE-2024-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
    },
    {
      "name": "CVE-2024-21896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
    },
    {
      "name": "CVE-2023-30431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2024-25024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25024"
    },
    {
      "name": "CVE-2024-22361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
    },
    {
      "name": "CVE-2024-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2023-35012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-30443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
    },
    {
      "name": "CVE-2024-29415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
    },
    {
      "name": "CVE-2023-27869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2023-30446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-46809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2023-27868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-37168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37168"
    },
    {
      "name": "CVE-2024-28176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2022-41917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
    },
    {
      "name": "CVE-2024-22019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
    },
    {
      "name": "CVE-2024-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22233"
    },
    {
      "name": "CVE-2023-30445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
    },
    {
      "name": "CVE-2023-30447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
    },
    {
      "name": "CVE-2024-21634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
    },
    {
      "name": "CVE-2023-30442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
    },
    {
      "name": "CVE-2024-27983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
    },
    {
      "name": "CVE-2024-30261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30261"
    },
    {
      "name": "CVE-2023-27867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2024-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
    },
    {
      "name": "CVE-2024-21147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
    },
    {
      "name": "CVE-2024-27982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
    },
    {
      "name": "CVE-2024-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2023-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
    },
    {
      "name": "CVE-2023-30448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2023-2597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
    },
    {
      "name": "CVE-2023-27558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2023-30449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
    },
    {
      "name": "CVE-2023-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
    },
    {
      "name": "CVE-2023-5676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
    },
    {
      "name": "CVE-2022-36046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
    },
    {
      "name": "CVE-2024-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
    },
    {
      "name": "CVE-2023-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2024-30260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30260"
    },
    {
      "name": "CVE-2023-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
    },
    {
      "name": "CVE-2024-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2023-23487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-31130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
    },
    {
      "name": "CVE-2023-42282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2024-28799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28799"
    },
    {
      "name": "CVE-2023-21967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-27267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2023-23612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2024-08-16T00:00:00",
  "last_revision_date": "2024-08-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0692",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-08-11",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165247",
      "url": "https://www.ibm.com/support/pages/node/7165247"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165360",
      "url": "https://www.ibm.com/support/pages/node/7165360"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165340",
      "url": "https://www.ibm.com/support/pages/node/7165340"
    },
    {
      "published_at": "2024-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165344",
      "url": "https://www.ibm.com/support/pages/node/7165344"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165423",
      "url": "https://www.ibm.com/support/pages/node/7165423"
    },
    {
      "published_at": "2024-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165284",
      "url": "https://www.ibm.com/support/pages/node/7165284"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165362",
      "url": "https://www.ibm.com/support/pages/node/7165362"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165364",
      "url": "https://www.ibm.com/support/pages/node/7165364"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165363",
      "url": "https://www.ibm.com/support/pages/node/7165363"
    },
    {
      "published_at": "2024-08-14",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165488",
      "url": "https://www.ibm.com/support/pages/node/7165488"
    },
    {
      "published_at": "2024-08-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7165685",
      "url": "https://www.ibm.com/support/pages/node/7165685"
    }
  ]
}
  CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2010-1205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
    },
    {
      "name": "CVE-2014-1544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
    },
    {
      "name": "CVE-2014-1568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
    },
    {
      "name": "CVE-2015-7182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
    },
    {
      "name": "CVE-2015-7181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
    },
    {
      "name": "CVE-2015-7575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
    },
    {
      "name": "CVE-2016-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
    },
    {
      "name": "CVE-2017-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
    },
    {
      "name": "CVE-2018-12384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-11729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2018-12404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2019-11745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
    },
    {
      "name": "CVE-2019-8331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2018-18508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
    },
    {
      "name": "CVE-2019-17007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
    },
    {
      "name": "CVE-2018-20677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
    },
    {
      "name": "CVE-2018-14040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
    },
    {
      "name": "CVE-2018-14042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
    },
    {
      "name": "CVE-2016-10735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
    },
    {
      "name": "CVE-2018-20676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
    },
    {
      "name": "CVE-2017-12652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
    },
    {
      "name": "CVE-2020-25648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2021-38153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
    },
    {
      "name": "CVE-2021-43138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
    },
    {
      "name": "CVE-2022-34749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-31130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2023-25194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-30774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2020-19189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2022-21699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-30086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
    },
    {
      "name": "CVE-2023-26965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
    },
    {
      "name": "CVE-2023-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2022-48554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-5388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2024-28849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
    },
    {
      "name": "CVE-2024-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-4367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
    },
    {
      "name": "CVE-2024-27983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2024-23944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
    },
    {
      "name": "CVE-2023-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-34102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2021-36770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-28176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
    },
    {
      "name": "CVE-2024-28863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-4068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
    },
    {
      "name": "CVE-2023-50495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
    },
    {
      "name": "CVE-2024-27982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
    },
    {
      "name": "CVE-2023-52356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
    },
    {
      "name": "CVE-2023-6228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
    },
    {
      "name": "CVE-2023-6277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2024-39008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
    },
    {
      "name": "CVE-2023-3164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
    },
    {
      "name": "CVE-2024-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
    },
    {
      "name": "CVE-2024-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
    },
    {
      "name": "CVE-2024-27980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
    },
    {
      "name": "CVE-2024-36137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
    },
    {
      "name": "CVE-2024-36138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
    },
    {
      "name": "CVE-2024-37372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2024-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
    },
    {
      "name": "CVE-2018-15209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
    },
    {
      "name": "CVE-2023-37536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2018-14041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2024-25638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
    },
    {
      "name": "CVE-2024-51504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
    },
    {
      "name": "CVE-2024-7006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
    },
    {
      "name": "CVE-2013-2099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
    },
    {
      "name": "CVE-2014-1569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
    },
    {
      "name": "CVE-2017-11613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
    },
    {
      "name": "CVE-2017-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
    },
    {
      "name": "CVE-2017-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
    },
    {
      "name": "CVE-2017-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
    },
    {
      "name": "CVE-2017-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
    },
    {
      "name": "CVE-2017-12627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
    },
    {
      "name": "CVE-2017-18013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
    },
    {
      "name": "CVE-2017-18869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
    },
    {
      "name": "CVE-2017-9937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
    },
    {
      "name": "CVE-2018-16335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
    },
    {
      "name": "CVE-2018-17000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
    },
    {
      "name": "CVE-2018-17100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
    },
    {
      "name": "CVE-2018-17101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
    },
    {
      "name": "CVE-2018-19210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
    },
    {
      "name": "CVE-2018-5784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
    },
    {
      "name": "CVE-2018-7456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
    },
    {
      "name": "CVE-2019-10255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
    },
    {
      "name": "CVE-2019-14973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
    },
    {
      "name": "CVE-2019-17546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
    },
    {
      "name": "CVE-2019-6128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
    },
    {
      "name": "CVE-2020-15110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
    },
    {
      "name": "CVE-2020-18768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
    },
    {
      "name": "CVE-2020-19131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
    },
    {
      "name": "CVE-2020-19144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
    },
    {
      "name": "CVE-2020-26261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
    },
    {
      "name": "CVE-2020-35521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
    },
    {
      "name": "CVE-2020-35522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
    },
    {
      "name": "CVE-2020-35523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
    },
    {
      "name": "CVE-2020-35524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
    },
    {
      "name": "CVE-2020-36191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
    },
    {
      "name": "CVE-2021-32862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
    },
    {
      "name": "CVE-2022-0561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
    },
    {
      "name": "CVE-2022-0562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
    },
    {
      "name": "CVE-2022-0891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
    },
    {
      "name": "CVE-2022-0908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
    },
    {
      "name": "CVE-2022-2056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
    },
    {
      "name": "CVE-2022-2057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
    },
    {
      "name": "CVE-2022-2058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
    },
    {
      "name": "CVE-2022-22844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
    },
    {
      "name": "CVE-2022-2867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
    },
    {
      "name": "CVE-2022-2868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
    },
    {
      "name": "CVE-2022-2869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
    },
    {
      "name": "CVE-2022-34266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
    },
    {
      "name": "CVE-2022-34526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
    },
    {
      "name": "CVE-2022-3479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    },
    {
      "name": "CVE-2022-3597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
    },
    {
      "name": "CVE-2022-3598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
    },
    {
      "name": "CVE-2022-3599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
    },
    {
      "name": "CVE-2022-3626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
    },
    {
      "name": "CVE-2022-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
    },
    {
      "name": "CVE-2022-40090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
    },
    {
      "name": "CVE-2022-4645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
    },
    {
      "name": "CVE-2023-0795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
    },
    {
      "name": "CVE-2023-0796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
    },
    {
      "name": "CVE-2023-0797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
    },
    {
      "name": "CVE-2023-0798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
    },
    {
      "name": "CVE-2023-0799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
    },
    {
      "name": "CVE-2023-0800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
    },
    {
      "name": "CVE-2023-0801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
    },
    {
      "name": "CVE-2023-0802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
    },
    {
      "name": "CVE-2023-0803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
    },
    {
      "name": "CVE-2023-0804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2023-24816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
    },
    {
      "name": "CVE-2023-25434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
    },
    {
      "name": "CVE-2023-25435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
    },
    {
      "name": "CVE-2023-2731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
    },
    {
      "name": "CVE-2023-2908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
    },
    {
      "name": "CVE-2023-30775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
    },
    {
      "name": "CVE-2023-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
    },
    {
      "name": "CVE-2023-38288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
    },
    {
      "name": "CVE-2023-38289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
    },
    {
      "name": "CVE-2023-40745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
    },
    {
      "name": "CVE-2023-41175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
    },
    {
      "name": "CVE-2023-41334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
    },
    {
      "name": "CVE-2023-4421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
    },
    {
      "name": "CVE-2023-4759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
    },
    {
      "name": "CVE-2023-50291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
    },
    {
      "name": "CVE-2023-50292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
    },
    {
      "name": "CVE-2023-50298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
    },
    {
      "name": "CVE-2023-50386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
    },
    {
      "name": "CVE-2023-50447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
    },
    {
      "name": "CVE-2024-25016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
    },
    {
      "name": "CVE-2024-29896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
    },
    {
      "name": "CVE-2024-33883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
    },
    {
      "name": "CVE-2024-38337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
    },
    {
      "name": "CVE-2024-41752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
    },
    {
      "name": "CVE-2024-45082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
    }
  ],
  "initial_release_date": "2024-12-20T00:00:00",
  "last_revision_date": "2024-12-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1103",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
      "url": "https://www.ibm.com/support/pages/node/7177142"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
      "url": "https://www.ibm.com/support/pages/node/7177223"
    },
    {
      "published_at": "2024-12-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
      "url": "https://www.ibm.com/support/pages/node/7179044"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
      "url": "https://www.ibm.com/support/pages/node/7179156"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
      "url": "https://www.ibm.com/support/pages/node/7179166"
    },
    {
      "published_at": "2024-12-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
      "url": "https://www.ibm.com/support/pages/node/7178835"
    }
  ]
}
  CERTFR-2024-AVI-0903
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | WebSphere Application Server Liberty versions 20.0.12 à 24.0.0.10 sans le correctif de sécurité PH63533 ou antérieures à 24.0.0.11 (disponibilité prévue pour le dernier trimestre 2024) | ||
| IBM | N/A | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Storage Protect Server versions 8.1.x antérieures à 8.1.24 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Robotic Process Automation versions 21.0..0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | Robotic Process Automation versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 21.0.0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | QRadar Network Capture versions 7.5.x antérieures à 7.5.0 Update Package 10 | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WebSphere Application Server Liberty versions 20.0.12 \u00e0 24.0.0.10  sans le correctif de s\u00e9curit\u00e9 PH63533 ou ant\u00e9rieures \u00e0 24.0.0.11 (disponibilit\u00e9 pr\u00e9vue pour le dernier trimestre 2024)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Storage Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.24",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Robotic Process Automation pour Cloud Pak versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Robotic Process Automation versions 21.0..0.x ant\u00e9rieures \u00e0 21.0.7.18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Robotic Process Automation versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Robotic Process Automation pour Cloud Pak versions 21.0.0.x ant\u00e9rieures \u00e0 21.0.7.18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Network Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Update Package 10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2023-25577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
    },
    {
      "name": "CVE-2023-37536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
    },
    {
      "name": "CVE-2023-52675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
    },
    {
      "name": "CVE-2024-26656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-26974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
    },
    {
      "name": "CVE-2022-48468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
    },
    {
      "name": "CVE-2023-20592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
    },
    {
      "name": "CVE-2018-1311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1311"
    },
    {
      "name": "CVE-2024-26585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
    },
    {
      "name": "CVE-2024-23944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
    },
    {
      "name": "CVE-2024-27397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
    },
    {
      "name": "CVE-2020-25219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25219"
    },
    {
      "name": "CVE-2024-35854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2023-52878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-45178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
    },
    {
      "name": "CVE-2024-5564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
    },
    {
      "name": "CVE-2023-23934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
    },
    {
      "name": "CVE-2021-42771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
    },
    {
      "name": "CVE-2023-52669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
    },
    {
      "name": "CVE-2024-31881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
    },
    {
      "name": "CVE-2024-36004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
    },
    {
      "name": "CVE-2024-26859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
    },
    {
      "name": "CVE-2022-38725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
    },
    {
      "name": "CVE-2024-35959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
    },
    {
      "name": "CVE-2024-35855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
    },
    {
      "name": "CVE-2024-31880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-26801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
    },
    {
      "name": "CVE-2024-36007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
    },
    {
      "name": "CVE-2021-47311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
    },
    {
      "name": "CVE-2024-28762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
    },
    {
      "name": "CVE-2021-45429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45429"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-35852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
    },
    {
      "name": "CVE-2020-7212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7212"
    },
    {
      "name": "CVE-2023-52781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
    },
    {
      "name": "CVE-2024-35845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
    },
    {
      "name": "CVE-2021-47073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2024-28786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28786"
    },
    {
      "name": "CVE-2023-52686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
    },
    {
      "name": "CVE-2021-47236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
    },
    {
      "name": "CVE-2024-35890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-52877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2023-6349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2024-32487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
    },
    {
      "name": "CVE-2024-26826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
    },
    {
      "name": "CVE-2024-26583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
    },
    {
      "name": "CVE-2024-35888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2023-52700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
    },
    {
      "name": "CVE-2023-46136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2021-47495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
    },
    {
      "name": "CVE-2024-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
    },
    {
      "name": "CVE-2024-26906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
    },
    {
      "name": "CVE-2024-26584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
    },
    {
      "name": "CVE-2023-31346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
    },
    {
      "name": "CVE-2024-5197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-35835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
    },
    {
      "name": "CVE-2024-26735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
    },
    {
      "name": "CVE-2023-52881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
    },
    {
      "name": "CVE-2021-46972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2023-29267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
    },
    {
      "name": "CVE-2023-52667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
    },
    {
      "name": "CVE-2023-52703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
    },
    {
      "name": "CVE-2022-48624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
    },
    {
      "name": "CVE-2024-26759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
    },
    {
      "name": "CVE-2023-52464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
    },
    {
      "name": "CVE-2023-52813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
    },
    {
      "name": "CVE-2024-35838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
    },
    {
      "name": "CVE-2023-52615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
    },
    {
      "name": "CVE-2023-52560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2022-46329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
    },
    {
      "name": "CVE-2021-47069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
    },
    {
      "name": "CVE-2020-26154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26154"
    },
    {
      "name": "CVE-2024-35960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
    },
    {
      "name": "CVE-2023-30861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2020-26555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
    },
    {
      "name": "CVE-2024-35789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
    },
    {
      "name": "CVE-2023-52835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2021-47310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
    },
    {
      "name": "CVE-2023-52626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
    },
    {
      "name": "CVE-2024-35958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
    },
    {
      "name": "CVE-2024-22354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
    },
    {
      "name": "CVE-2021-47456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
    },
    {
      "name": "CVE-2024-28752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
    },
    {
      "name": "CVE-2021-47356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2021-47353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2023-5090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
    },
    {
      "name": "CVE-2024-27410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
    },
    {
      "name": "CVE-2021-46909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
    },
    {
      "name": "CVE-2024-35853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
    },
    {
      "name": "CVE-2024-26907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
    }
  ],
  "initial_release_date": "2024-10-18T00:00:00",
  "last_revision_date": "2024-10-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0903",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-10-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173421",
      "url": "https://www.ibm.com/support/pages/node/7173421"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173043",
      "url": "https://www.ibm.com/support/pages/node/7173043"
    },
    {
      "published_at": "2024-10-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173420",
      "url": "https://www.ibm.com/support/pages/node/7173420"
    },
    {
      "published_at": "2024-10-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173226",
      "url": "https://www.ibm.com/support/pages/node/7173226"
    },
    {
      "published_at": "2024-10-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173224",
      "url": "https://www.ibm.com/support/pages/node/7173224"
    },
    {
      "published_at": "2024-10-15",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7173097",
      "url": "https://www.ibm.com/support/pages/node/7173097"
    }
  ]
}
  CERTFR-2024-AVI-0797
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions 5.4.x antérieures à 5.4.12.1 | ||
| IBM | Db2 | DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la dernière version du JRE | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 IF03 | ||
| IBM | AIX | AIX version 7.3 avec Python versions 3.9.x antérieures à 3.9.19.3 | ||
| IBM | VIOS | VIOS version 4.1 avec Python versions 3.9.x antérieures à 3.9.19.3 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Spectrum Control versions 5.4.x ant\u00e9rieures \u00e0 5.4.12.1",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la derni\u00e8re version du JRE",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF03",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-42472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-21144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
    },
    {
      "name": "CVE-2024-3933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-21147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
    },
    {
      "name": "CVE-2024-26906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
    },
    {
      "name": "CVE-2024-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-21138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-21145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2024-21131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
    },
    {
      "name": "CVE-2024-22354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
    },
    {
      "name": "CVE-2024-27267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2024-09-20T00:00:00",
  "last_revision_date": "2024-09-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0797",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-09-18",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168925",
      "url": "https://www.ibm.com/support/pages/node/7168925"
    },
    {
      "published_at": "2024-09-18",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168815",
      "url": "https://www.ibm.com/support/pages/node/7168815"
    },
    {
      "published_at": "2024-09-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168787",
      "url": "https://www.ibm.com/support/pages/node/7168787"
    },
    {
      "published_at": "2024-09-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168639",
      "url": "https://www.ibm.com/support/pages/node/7168639"
    }
  ]
}
  CERTFR-2024-AVI-0356
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Elles permettent à un attaquant de provoquer un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.4.0 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.4.0",
      "product": {
        "name": "Nessus Network Monitor",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2023-28711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28711"
    }
  ],
  "initial_release_date": "2024-04-30T00:00:00",
  "last_revision_date": "2024-04-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0356",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus\nNetwork Monitor. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n\n\u00a0\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2024-07 du 30 avril 2024",
      "url": "https://www.tenable.com/security/tns-2024-07"
    }
  ]
}
  fkie_cve-2024-25629
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183 | Patch | |
| security-advisories@github.com | https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q | Vendor Advisory | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/ | Mailing List | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/ | Mailing List | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/ | Mailing List | 
| Vendor | Product | Version | |
|---|---|---|---|
| c-ares | c-ares | * | |
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 | |
| fedoraproject | fedora | 40 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B2994F-77FD-46CD-B5DC-9DD93A338656",
              "versionEndExcluding": "1.27.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist."
    },
    {
      "lang": "es",
      "value": "c-ares es una librer\u00eda C para solicitudes DNS asincr\u00f3nicas. `ares__read_line()` se usa para analizar archivos de configuraci\u00f3n locales como `/etc/resolv.conf`, `/etc/nsswitch.conf`, el archivo `HOSTALIASES` y si se usa una versi\u00f3n de c-ares anterior a 1.27. 0, el archivo `/etc/hosts`. Si alguno de estos archivos de configuraci\u00f3n tiene un car\u00e1cter \"NULL\" incrustado como primer car\u00e1cter en una nueva l\u00ednea, puede provocar que se intente leer la memoria antes del inicio del b\u00fafer dado, lo que puede provocar un bloqueo. Este problema se solucion\u00f3 en c-ares 1.27.0. No existen workarounds."
    }
  ],
  "id": "CVE-2024-25629",
  "lastModified": "2025-02-05T21:41:30.157",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-23T15:15:09.237",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-127"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  suse-su-2024:1136-2
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for c-ares",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for c-ares fixes the following issues:\n\n- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1136,SUSE-SLE-Micro-5.5-2024-1136",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1136-2.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1136-2",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241136-2/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1136-2",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035974.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220279",
        "url": "https://bugzilla.suse.com/1220279"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-25629 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-25629/"
      }
    ],
    "title": "Security update for c-ares",
    "tracking": {
      "current_release_date": "2024-04-08T09:30:36Z",
      "generator": {
        "date": "2024-04-08T09:30:36Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1136-2",
      "initial_release_date": "2024-04-08T09:30:36Z",
      "revision_history": [
        {
          "date": "2024-04-08T09:30:36Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32",
                "product": {
                  "name": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32",
                  "product_id": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.i586",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.i586",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.i586",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.s390x",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.s390x",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-25629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-25629",
          "url": "https://www.suse.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220279 for CVE-2024-25629",
          "url": "https://bugzilla.suse.com/1220279"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-08T09:30:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-25629"
    }
  ]
}
  suse-su-2024:1135-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for libcares2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for libcares2 fixes the following issues:\n\n- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1135,SUSE-SLE-SDK-12-SP5-2024-1135,SUSE-SLE-SERVER-12-SP5-2024-1135,SUSE-SLE-WE-12-SP5-2024-1135",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1135-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1135-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241135-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1135-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034887.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220279",
        "url": "https://bugzilla.suse.com/1220279"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-25629 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-25629/"
      }
    ],
    "title": "Security update for libcares2",
    "tracking": {
      "current_release_date": "2024-04-08T09:29:49Z",
      "generator": {
        "date": "2024-04-08T09:29:49Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1135-1",
      "initial_release_date": "2024-04-08T09:29:49Z",
      "revision_history": [
        {
          "date": "2024-04-08T09:29:49Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.aarch64",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.aarch64",
                  "product_id": "libcares-devel-1.9.1-9.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.aarch64",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.aarch64",
                  "product_id": "libcares2-1.9.1-9.21.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares2-64bit-1.9.1-9.21.1.aarch64_ilp32",
                "product": {
                  "name": "libcares2-64bit-1.9.1-9.21.1.aarch64_ilp32",
                  "product_id": "libcares2-64bit-1.9.1-9.21.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.i586",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.i586",
                  "product_id": "libcares-devel-1.9.1-9.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.i586",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.i586",
                  "product_id": "libcares2-1.9.1-9.21.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.ppc64le",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.ppc64le",
                  "product_id": "libcares-devel-1.9.1-9.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.ppc64le",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.ppc64le",
                  "product_id": "libcares2-1.9.1-9.21.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.s390",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.s390",
                  "product_id": "libcares-devel-1.9.1-9.21.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.s390",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.s390",
                  "product_id": "libcares2-1.9.1-9.21.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.s390x",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.s390x",
                  "product_id": "libcares-devel-1.9.1-9.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.s390x",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.s390x",
                  "product_id": "libcares2-1.9.1-9.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.9.1-9.21.1.s390x",
                "product": {
                  "name": "libcares2-32bit-1.9.1-9.21.1.s390x",
                  "product_id": "libcares2-32bit-1.9.1-9.21.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares-devel-1.9.1-9.21.1.x86_64",
                "product": {
                  "name": "libcares-devel-1.9.1-9.21.1.x86_64",
                  "product_id": "libcares-devel-1.9.1-9.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.9.1-9.21.1.x86_64",
                "product": {
                  "name": "libcares2-1.9.1-9.21.1.x86_64",
                  "product_id": "libcares2-1.9.1-9.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.9.1-9.21.1.x86_64",
                "product": {
                  "name": "libcares2-32bit-1.9.1-9.21.1.x86_64",
                  "product_id": "libcares2-32bit-1.9.1-9.21.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares-devel-1.9.1-9.21.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.aarch64"
        },
        "product_reference": "libcares-devel-1.9.1-9.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares-devel-1.9.1-9.21.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.ppc64le"
        },
        "product_reference": "libcares-devel-1.9.1-9.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares-devel-1.9.1-9.21.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.s390x"
        },
        "product_reference": "libcares-devel-1.9.1-9.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares-devel-1.9.1-9.21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.x86_64"
        },
        "product_reference": "libcares-devel-1.9.1-9.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.aarch64"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.ppc64le"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.s390x"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.x86_64"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.aarch64"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.ppc64le"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.s390x"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.9.1-9.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.x86_64"
        },
        "product_reference": "libcares2-1.9.1-9.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.9.1-9.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libcares2-32bit-1.9.1-9.21.1.x86_64"
        },
        "product_reference": "libcares2-32bit-1.9.1-9.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-25629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:libcares2-32bit-1.9.1-9.21.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-25629",
          "url": "https://www.suse.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220279 for CVE-2024-25629",
          "url": "https://bugzilla.suse.com/1220279"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:libcares2-32bit-1.9.1-9.21.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libcares2-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:libcares-devel-1.9.1-9.21.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:libcares2-32bit-1.9.1-9.21.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-08T09:29:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-25629"
    }
  ]
}
  suse-su-2024:1136-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for c-ares",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for c-ares fixes the following issues:\n\n- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1136,SUSE-SLE-Micro-5.3-2024-1136,SUSE-SLE-Micro-5.4-2024-1136,SUSE-SLE-Micro-5.5-2024-1136,SUSE-SLE-Module-Basesystem-15-SP5-2024-1136,SUSE-SUSE-MicroOS-5.1-2024-1136,SUSE-SUSE-MicroOS-5.2-2024-1136,openSUSE-Leap-Micro-5.3-2024-1136,openSUSE-Leap-Micro-5.4-2024-1136,openSUSE-SLE-15.5-2024-1136",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1136-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1136-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241136-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1136-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220279",
        "url": "https://bugzilla.suse.com/1220279"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-25629 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-25629/"
      }
    ],
    "title": "Security update for c-ares",
    "tracking": {
      "current_release_date": "2024-04-08T09:30:21Z",
      "generator": {
        "date": "2024-04-08T09:30:21Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1136-1",
      "initial_release_date": "2024-04-08T09:30:21Z",
      "revision_history": [
        {
          "date": "2024-04-08T09:30:21Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.aarch64",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.aarch64",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32",
                "product": {
                  "name": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32",
                  "product_id": "libcares2-64bit-1.19.1-150000.3.26.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.i586",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.i586",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.i586",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.i586",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.ppc64le",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.ppc64le",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.s390x",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.s390x",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.s390x",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "c-ares-devel-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "c-ares-utils-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "c-ares-utils-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "c-ares-utils-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "libcares2-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "libcares2-1.19.1-150000.3.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
                "product": {
                  "name": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
                  "product_id": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.3",
                "product": {
                  "name": "openSUSE Leap Micro 5.3",
                  "product_id": "openSUSE Leap Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.4",
                "product": {
                  "name": "openSUSE Leap Micro 5.4",
                  "product_id": "openSUSE Leap Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of openSUSE Leap Micro 5.3",
          "product_id": "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap Micro 5.3",
          "product_id": "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-devel-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "c-ares-devel-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.19.1-150000.3.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "c-ares-utils-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.19.1-150000.3.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "c-ares-utils-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "c-ares-utils-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "c-ares-utils-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.aarch64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.ppc64le"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.s390x"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcares2-32bit-1.19.1-150000.3.26.1.x86_64"
        },
        "product_reference": "libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-25629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
          "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
          "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
          "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.aarch64",
          "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
          "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.s390x",
          "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.aarch64",
          "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
          "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.s390x",
          "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap 15.5:libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
          "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
          "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
          "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
          "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-25629",
          "url": "https://www.suse.com/security/cve/CVE-2024-25629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220279 for CVE-2024-25629",
          "url": "https://bugzilla.suse.com/1220279"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:c-ares-devel-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:c-ares-utils-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.ppc64le",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap 15.5:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap 15.5:libcares2-32bit-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap Micro 5.3:libcares2-1.19.1-150000.3.26.1.x86_64",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.aarch64",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.s390x",
            "openSUSE Leap Micro 5.4:libcares2-1.19.1-150000.3.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-08T09:30:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-25629"
    }
  ]
}
  msrc_cve-2024-25629
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-25629 c-ares out of bounds read in ares__read_line() - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-25629.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "c-ares out of bounds read in ares__read_line()",
    "tracking": {
      "current_release_date": "2025-05-27T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T01:03:24.900Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-25629",
      "initial_release_date": "2024-02-02T08:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-02-26T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2024-06-30T07:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Information published."
        },
        {
          "date": "2024-08-29T00:00:00.000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Information published."
        },
        {
          "date": "2024-08-30T00:00:00.000Z",
          "legacy_version": "1.3",
          "number": "4",
          "summary": "Information published."
        },
        {
          "date": "2024-08-31T00:00:00.000Z",
          "legacy_version": "1.4",
          "number": "5",
          "summary": "Information published."
        },
        {
          "date": "2024-09-01T00:00:00.000Z",
          "legacy_version": "1.5",
          "number": "6",
          "summary": "Information published."
        },
        {
          "date": "2024-09-02T00:00:00.000Z",
          "legacy_version": "1.6",
          "number": "7",
          "summary": "Information published."
        },
        {
          "date": "2024-09-03T00:00:00.000Z",
          "legacy_version": "1.7",
          "number": "8",
          "summary": "Information published."
        },
        {
          "date": "2024-09-05T00:00:00.000Z",
          "legacy_version": "1.8",
          "number": "9",
          "summary": "Information published."
        },
        {
          "date": "2024-09-06T00:00:00.000Z",
          "legacy_version": "1.9",
          "number": "10",
          "summary": "Information published."
        },
        {
          "date": "2024-09-07T00:00:00.000Z",
          "legacy_version": "2",
          "number": "11",
          "summary": "Information published."
        },
        {
          "date": "2024-09-08T00:00:00.000Z",
          "legacy_version": "2.1",
          "number": "12",
          "summary": "Information published."
        },
        {
          "date": "2024-09-11T00:00:00.000Z",
          "legacy_version": "2.2",
          "number": "13",
          "summary": "Information published."
        },
        {
          "date": "2024-10-22T00:00:00.000Z",
          "legacy_version": "2.3",
          "number": "14",
          "summary": "Added fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0\nAdded fluent-bit to Azure Linux 3.0\nAdded c-ares to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0"
        },
        {
          "date": "2024-11-09T00:00:00.000Z",
          "legacy_version": "2.4",
          "number": "15",
          "summary": "Added python-gevent to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded c-ares to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-02-08T00:00:00.000Z",
          "legacy_version": "2.5",
          "number": "16",
          "summary": "Added fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0\nAdded c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0"
        },
        {
          "date": "2025-02-23T00:00:00.000Z",
          "legacy_version": "2.6",
          "number": "17",
          "summary": "Added c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0\nAdded c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0"
        },
        {
          "date": "2025-02-27T00:00:00.000Z",
          "legacy_version": "2.7",
          "number": "18",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-02-28T00:00:00.000Z",
          "legacy_version": "2.8",
          "number": "19",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-01T00:00:00.000Z",
          "legacy_version": "2.9",
          "number": "20",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-02T00:00:00.000Z",
          "legacy_version": "3",
          "number": "21",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-03T00:00:00.000Z",
          "legacy_version": "3.1",
          "number": "22",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-04T00:00:00.000Z",
          "legacy_version": "3.2",
          "number": "23",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-05T00:00:00.000Z",
          "legacy_version": "3.3",
          "number": "24",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-06T00:00:00.000Z",
          "legacy_version": "3.4",
          "number": "25",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-08T00:00:00.000Z",
          "legacy_version": "3.5",
          "number": "26",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-09T00:00:00.000Z",
          "legacy_version": "3.6",
          "number": "27",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-10T00:00:00.000Z",
          "legacy_version": "3.7",
          "number": "28",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-11T00:00:00.000Z",
          "legacy_version": "3.8",
          "number": "29",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-12T00:00:00.000Z",
          "legacy_version": "3.9",
          "number": "30",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-13T00:00:00.000Z",
          "legacy_version": "4",
          "number": "31",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-14T00:00:00.000Z",
          "legacy_version": "4.1",
          "number": "32",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-15T00:00:00.000Z",
          "legacy_version": "4.2",
          "number": "33",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-16T00:00:00.000Z",
          "legacy_version": "4.3",
          "number": "34",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-17T00:00:00.000Z",
          "legacy_version": "4.4",
          "number": "35",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-18T00:00:00.000Z",
          "legacy_version": "4.5",
          "number": "36",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-19T00:00:00.000Z",
          "legacy_version": "4.6",
          "number": "37",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-20T00:00:00.000Z",
          "legacy_version": "4.7",
          "number": "38",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-21T00:00:00.000Z",
          "legacy_version": "4.8",
          "number": "39",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-22T00:00:00.000Z",
          "legacy_version": "4.9",
          "number": "40",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-23T00:00:00.000Z",
          "legacy_version": "5",
          "number": "41",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-24T00:00:00.000Z",
          "legacy_version": "5.1",
          "number": "42",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-25T00:00:00.000Z",
          "legacy_version": "5.2",
          "number": "43",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-26T00:00:00.000Z",
          "legacy_version": "5.3",
          "number": "44",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-27T00:00:00.000Z",
          "legacy_version": "5.4",
          "number": "45",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-28T00:00:00.000Z",
          "legacy_version": "5.5",
          "number": "46",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-29T00:00:00.000Z",
          "legacy_version": "5.6",
          "number": "47",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-30T00:00:00.000Z",
          "legacy_version": "5.7",
          "number": "48",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-03-31T00:00:00.000Z",
          "legacy_version": "5.8",
          "number": "49",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-01T00:00:00.000Z",
          "legacy_version": "5.9",
          "number": "50",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-03T00:00:00.000Z",
          "legacy_version": "6",
          "number": "51",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-04T00:00:00.000Z",
          "legacy_version": "6.1",
          "number": "52",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-05T00:00:00.000Z",
          "legacy_version": "6.2",
          "number": "53",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-06T00:00:00.000Z",
          "legacy_version": "6.3",
          "number": "54",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-07T00:00:00.000Z",
          "legacy_version": "6.4",
          "number": "55",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-08T00:00:00.000Z",
          "legacy_version": "6.5",
          "number": "56",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-09T00:00:00.000Z",
          "legacy_version": "6.6",
          "number": "57",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-11T00:00:00.000Z",
          "legacy_version": "6.7",
          "number": "58",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-12T00:00:00.000Z",
          "legacy_version": "6.8",
          "number": "59",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-13T00:00:00.000Z",
          "legacy_version": "6.9",
          "number": "60",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-14T00:00:00.000Z",
          "legacy_version": "7",
          "number": "61",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-15T00:00:00.000Z",
          "legacy_version": "7.1",
          "number": "62",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-16T00:00:00.000Z",
          "legacy_version": "7.2",
          "number": "63",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-17T00:00:00.000Z",
          "legacy_version": "7.3",
          "number": "64",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-18T00:00:00.000Z",
          "legacy_version": "7.4",
          "number": "65",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-19T00:00:00.000Z",
          "legacy_version": "7.5",
          "number": "66",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-20T00:00:00.000Z",
          "legacy_version": "7.6",
          "number": "67",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-21T00:00:00.000Z",
          "legacy_version": "7.7",
          "number": "68",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-22T00:00:00.000Z",
          "legacy_version": "7.8",
          "number": "69",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-23T00:00:00.000Z",
          "legacy_version": "7.9",
          "number": "70",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-24T00:00:00.000Z",
          "legacy_version": "8",
          "number": "71",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-25T00:00:00.000Z",
          "legacy_version": "8.1",
          "number": "72",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-26T00:00:00.000Z",
          "legacy_version": "8.2",
          "number": "73",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-28T00:00:00.000Z",
          "legacy_version": "8.3",
          "number": "74",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-29T00:00:00.000Z",
          "legacy_version": "8.4",
          "number": "75",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-04-30T00:00:00.000Z",
          "legacy_version": "8.5",
          "number": "76",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-01T00:00:00.000Z",
          "legacy_version": "8.6",
          "number": "77",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-02T00:00:00.000Z",
          "legacy_version": "8.7",
          "number": "78",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-03T00:00:00.000Z",
          "legacy_version": "8.8",
          "number": "79",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-04T00:00:00.000Z",
          "legacy_version": "8.9",
          "number": "80",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-05T00:00:00.000Z",
          "legacy_version": "9",
          "number": "81",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-06T00:00:00.000Z",
          "legacy_version": "9.1",
          "number": "82",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-07T00:00:00.000Z",
          "legacy_version": "9.2",
          "number": "83",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-08T00:00:00.000Z",
          "legacy_version": "9.3",
          "number": "84",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-09T00:00:00.000Z",
          "legacy_version": "9.4",
          "number": "85",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-10T00:00:00.000Z",
          "legacy_version": "9.5",
          "number": "86",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-11T00:00:00.000Z",
          "legacy_version": "9.6",
          "number": "87",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-12T00:00:00.000Z",
          "legacy_version": "9.7",
          "number": "88",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-13T00:00:00.000Z",
          "legacy_version": "9.8",
          "number": "89",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-14T00:00:00.000Z",
          "legacy_version": "9.9",
          "number": "90",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-15T00:00:00.000Z",
          "legacy_version": "1",
          "number": "91",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-16T00:00:00.000Z",
          "legacy_version": "10.1",
          "number": "92",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-17T00:00:00.000Z",
          "legacy_version": "10.2",
          "number": "93",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-18T00:00:00.000Z",
          "legacy_version": "10.3",
          "number": "94",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-19T00:00:00.000Z",
          "legacy_version": "10.4",
          "number": "95",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-20T00:00:00.000Z",
          "legacy_version": "10.5",
          "number": "96",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-21T00:00:00.000Z",
          "legacy_version": "10.6",
          "number": "97",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-22T00:00:00.000Z",
          "legacy_version": "10.7",
          "number": "98",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-23T00:00:00.000Z",
          "legacy_version": "10.8",
          "number": "99",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-24T00:00:00.000Z",
          "legacy_version": "10.9",
          "number": "100",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-25T00:00:00.000Z",
          "legacy_version": "11",
          "number": "101",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-26T00:00:00.000Z",
          "legacy_version": "11.1",
          "number": "102",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        },
        {
          "date": "2025-05-27T00:00:00.000Z",
          "legacy_version": "11.2",
          "number": "103",
          "summary": "Added c-ares to Azure Linux 3.0\nAdded fluent-bit to Azure Linux 3.0\nAdded nodejs to Azure Linux 3.0\nAdded python-gevent to Azure Linux 3.0\nAdded c-ares to CBL-Mariner 2.0\nAdded grpc to CBL-Mariner 2.0\nAdded fluent-bit to CBL-Mariner 2.0\nAdded nodejs18 to CBL-Mariner 2.0"
        }
      ],
      "status": "final",
      "version": "103"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 python-gevent 21.1.2-3",
                "product": {
                  "name": "\u003ccbl2 python-gevent 21.1.2-3",
                  "product_id": "19"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 python-gevent 21.1.2-3",
                "product": {
                  "name": "cbl2 python-gevent 21.1.2-3",
                  "product_id": "17433"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-gevent 23.9.1-4",
                "product": {
                  "name": "\u003cazl3 python-gevent 23.9.1-4",
                  "product_id": "14"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-gevent 23.9.1-4",
                "product": {
                  "name": "azl3 python-gevent 23.9.1-4",
                  "product_id": "17770"
                }
              }
            ],
            "category": "product_name",
            "name": "python-gevent"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 nodejs18 18.20.2-1",
                "product": {
                  "name": "\u003ccbl2 nodejs18 18.20.2-1",
                  "product_id": "20"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 nodejs18 18.20.2-1",
                "product": {
                  "name": "cbl2 nodejs18 18.20.2-1",
                  "product_id": "17347"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 nodejs18 18.18.2-7",
                "product": {
                  "name": "\u003ccbl2 nodejs18 18.18.2-7",
                  "product_id": "9"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 nodejs18 18.18.2-7",
                "product": {
                  "name": "cbl2 nodejs18 18.18.2-7",
                  "product_id": "19748"
                }
              }
            ],
            "category": "product_name",
            "name": "nodejs18"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 grpc 1.42.0-9",
                "product": {
                  "name": "\u003ccbl2 grpc 1.42.0-9",
                  "product_id": "18"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 grpc 1.42.0-9",
                "product": {
                  "name": "cbl2 grpc 1.42.0-9",
                  "product_id": "17434"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 grpc 1.42.0-11",
                "product": {
                  "name": "\u003ccbl2 grpc 1.42.0-11",
                  "product_id": "5"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 grpc 1.42.0-11",
                "product": {
                  "name": "cbl2 grpc 1.42.0-11",
                  "product_id": "19889"
                }
              }
            ],
            "category": "product_name",
            "name": "grpc"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 fluent-bit 2.2.3-1",
                "product": {
                  "name": "\u003ccbl2 fluent-bit 2.2.3-1",
                  "product_id": "21"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 fluent-bit 2.2.3-1",
                "product": {
                  "name": "cbl2 fluent-bit 2.2.3-1",
                  "product_id": "17326"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 fluent-bit 3.0.6-1",
                "product": {
                  "name": "\u003cazl3 fluent-bit 3.0.6-1",
                  "product_id": "15"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 fluent-bit 3.0.6-1",
                "product": {
                  "name": "azl3 fluent-bit 3.0.6-1",
                  "product_id": "17732"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 fluent-bit 3.0.6-2",
                "product": {
                  "name": "\u003ccbl2 fluent-bit 3.0.6-2",
                  "product_id": "7"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 fluent-bit 3.0.6-2",
                "product": {
                  "name": "cbl2 fluent-bit 3.0.6-2",
                  "product_id": "19787"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 fluent-bit 3.0.6-2",
                "product": {
                  "name": "\u003cazl3 fluent-bit 3.0.6-2",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 fluent-bit 3.0.6-2",
                "product": {
                  "name": "azl3 fluent-bit 3.0.6-2",
                  "product_id": "20173"
                }
              }
            ],
            "category": "product_name",
            "name": "fluent-bit"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 ceph 18.2.2-1",
                "product": {
                  "name": "\u003cazl3 ceph 18.2.2-1",
                  "product_id": "23"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 ceph 18.2.2-1",
                "product": {
                  "name": "azl3 ceph 18.2.2-1",
                  "product_id": "16855"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 ceph 18.2.2-8",
                "product": {
                  "name": "\u003cazl3 ceph 18.2.2-8",
                  "product_id": "12"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 ceph 18.2.2-8",
                "product": {
                  "name": "azl3 ceph 18.2.2-8",
                  "product_id": "19666"
                }
              }
            ],
            "category": "product_name",
            "name": "ceph"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 nodejs 20.14.0-1",
                "product": {
                  "name": "\u003cazl3 nodejs 20.14.0-1",
                  "product_id": "22"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 nodejs 20.14.0-1",
                "product": {
                  "name": "azl3 nodejs 20.14.0-1",
                  "product_id": "16990"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 nodejs 20.10.0-2",
                "product": {
                  "name": "\u003cazl3 nodejs 20.10.0-2",
                  "product_id": "11"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 nodejs 20.10.0-2",
                "product": {
                  "name": "azl3 nodejs 20.10.0-2",
                  "product_id": "19740"
                }
              }
            ],
            "category": "product_name",
            "name": "nodejs"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 c-ares 1.30.0-1",
                "product": {
                  "name": "\u003cazl3 c-ares 1.30.0-1",
                  "product_id": "13"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 c-ares 1.30.0-1",
                "product": {
                  "name": "azl3 c-ares 1.30.0-1",
                  "product_id": "17771"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 c-ares 1.19.1-2",
                "product": {
                  "name": "\u003ccbl2 c-ares 1.19.1-2",
                  "product_id": "4"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 c-ares 1.19.1-2",
                "product": {
                  "name": "cbl2 c-ares 1.19.1-2",
                  "product_id": "20149"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 c-ares 1.25.0-1",
                "product": {
                  "name": "\u003cazl3 c-ares 1.25.0-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 c-ares 1.25.0-1",
                "product": {
                  "name": "azl3 c-ares 1.25.0-1",
                  "product_id": "20170"
                }
              }
            ],
            "category": "product_name",
            "name": "c-ares"
          },
          {
            "category": "product_name",
            "name": "cbl2 python-gevent 21.1.2-3",
            "product": {
              "name": "cbl2 python-gevent 21.1.2-3",
              "product_id": "3"
            }
          },
          {
            "category": "product_name",
            "name": "cbl2 rubygem-mini_portile2 2.8.0-1",
            "product": {
              "name": "cbl2 rubygem-mini_portile2 2.8.0-1",
              "product_id": "8"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 rubygem-mini_portile2 2.8.4-1",
            "product": {
              "name": "azl3 rubygem-mini_portile2 2.8.4-1",
              "product_id": "10"
            }
          },
          {
            "category": "product_name",
            "name": "cbl2 ceph 16.2.10-7",
            "product": {
              "name": "cbl2 ceph 16.2.10-7",
              "product_id": "6"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 grpc 1.62.3-1",
            "product": {
              "name": "azl3 grpc 1.62.3-1",
              "product_id": "17"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 tensorflow 2.16.1-9",
            "product": {
              "name": "azl3 tensorflow 2.16.1-9",
              "product_id": "16"
            }
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 python-gevent 21.1.2-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-19"
        },
        "product_reference": "19",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 python-gevent 21.1.2-3 as a component of CBL Mariner 2.0",
          "product_id": "17433-17086"
        },
        "product_reference": "17433",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 nodejs18 18.20.2-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-20"
        },
        "product_reference": "20",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 nodejs18 18.20.2-1 as a component of CBL Mariner 2.0",
          "product_id": "17347-17086"
        },
        "product_reference": "17347",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 grpc 1.42.0-9 as a component of CBL Mariner 2.0",
          "product_id": "17086-18"
        },
        "product_reference": "18",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 grpc 1.42.0-9 as a component of CBL Mariner 2.0",
          "product_id": "17434-17086"
        },
        "product_reference": "17434",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 fluent-bit 2.2.3-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-21"
        },
        "product_reference": "21",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 fluent-bit 2.2.3-1 as a component of CBL Mariner 2.0",
          "product_id": "17326-17086"
        },
        "product_reference": "17326",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 ceph 18.2.2-1 as a component of Azure Linux 3.0",
          "product_id": "17084-23"
        },
        "product_reference": "23",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 ceph 18.2.2-1 as a component of Azure Linux 3.0",
          "product_id": "16855-17084"
        },
        "product_reference": "16855",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-gevent 23.9.1-4 as a component of Azure Linux 3.0",
          "product_id": "17084-14"
        },
        "product_reference": "14",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-gevent 23.9.1-4 as a component of Azure Linux 3.0",
          "product_id": "17770-17084"
        },
        "product_reference": "17770",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 nodejs 20.14.0-1 as a component of Azure Linux 3.0",
          "product_id": "17084-22"
        },
        "product_reference": "22",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 nodejs 20.14.0-1 as a component of Azure Linux 3.0",
          "product_id": "16990-17084"
        },
        "product_reference": "16990",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 fluent-bit 3.0.6-1 as a component of Azure Linux 3.0",
          "product_id": "17084-15"
        },
        "product_reference": "15",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 fluent-bit 3.0.6-1 as a component of Azure Linux 3.0",
          "product_id": "17732-17084"
        },
        "product_reference": "17732",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 c-ares 1.30.0-1 as a component of Azure Linux 3.0",
          "product_id": "17084-13"
        },
        "product_reference": "13",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 c-ares 1.30.0-1 as a component of Azure Linux 3.0",
          "product_id": "17771-17084"
        },
        "product_reference": "17771",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 c-ares 1.19.1-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-4"
        },
        "product_reference": "4",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 c-ares 1.19.1-2 as a component of CBL Mariner 2.0",
          "product_id": "20149-17086"
        },
        "product_reference": "20149",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 nodejs18 18.18.2-7 as a component of CBL Mariner 2.0",
          "product_id": "17086-9"
        },
        "product_reference": "9",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 nodejs18 18.18.2-7 as a component of CBL Mariner 2.0",
          "product_id": "19748-17086"
        },
        "product_reference": "19748",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 python-gevent 21.1.2-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 rubygem-mini_portile2 2.8.0-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-8"
        },
        "product_reference": "8",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 c-ares 1.25.0-1 as a component of Azure Linux 3.0",
          "product_id": "17084-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 c-ares 1.25.0-1 as a component of Azure Linux 3.0",
          "product_id": "20170-17084"
        },
        "product_reference": "20170",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 nodejs 20.10.0-2 as a component of Azure Linux 3.0",
          "product_id": "17084-11"
        },
        "product_reference": "11",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 nodejs 20.10.0-2 as a component of Azure Linux 3.0",
          "product_id": "19740-17084"
        },
        "product_reference": "19740",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 rubygem-mini_portile2 2.8.4-1 as a component of Azure Linux 3.0",
          "product_id": "17084-10"
        },
        "product_reference": "10",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 ceph 16.2.10-7 as a component of CBL Mariner 2.0",
          "product_id": "17086-6"
        },
        "product_reference": "6",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 fluent-bit 3.0.6-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-7"
        },
        "product_reference": "7",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 fluent-bit 3.0.6-2 as a component of CBL Mariner 2.0",
          "product_id": "19787-17086"
        },
        "product_reference": "19787",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 grpc 1.42.0-11 as a component of CBL Mariner 2.0",
          "product_id": "17086-5"
        },
        "product_reference": "5",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 grpc 1.42.0-11 as a component of CBL Mariner 2.0",
          "product_id": "19889-17086"
        },
        "product_reference": "19889",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 fluent-bit 3.0.6-2 as a component of Azure Linux 3.0",
          "product_id": "17084-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 fluent-bit 3.0.6-2 as a component of Azure Linux 3.0",
          "product_id": "20173-17084"
        },
        "product_reference": "20173",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 grpc 1.62.3-1 as a component of Azure Linux 3.0",
          "product_id": "17084-17"
        },
        "product_reference": "17",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 ceph 18.2.2-8 as a component of Azure Linux 3.0",
          "product_id": "17084-12"
        },
        "product_reference": "12",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 ceph 18.2.2-8 as a component of Azure Linux 3.0",
          "product_id": "19666-17084"
        },
        "product_reference": "19666",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
          "product_id": "17084-16"
        },
        "product_reference": "16",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-25629",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "flags": [
        {
          "label": "component_not_present",
          "product_ids": [
            "17084-10",
            "17084-17",
            "17084-16"
          ]
        },
        {
          "label": "vulnerable_code_not_in_execute_path",
          "product_ids": [
            "17086-8"
          ]
        },
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "17086-3",
            "17086-6"
          ]
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "GitHub_M",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17433-17086",
          "17347-17086",
          "17434-17086",
          "17326-17086",
          "16855-17084",
          "17770-17084",
          "16990-17084",
          "17732-17084",
          "17771-17084",
          "20149-17086",
          "19748-17086",
          "20170-17084",
          "19740-17084",
          "19787-17086",
          "19889-17086",
          "20173-17084",
          "19666-17084"
        ],
        "known_affected": [
          "17086-19",
          "17086-20",
          "17086-18",
          "17086-21",
          "17084-23",
          "17084-14",
          "17084-22",
          "17084-15",
          "17084-13",
          "17086-4",
          "17086-9",
          "17084-2",
          "17084-11",
          "17086-7",
          "17086-5",
          "17084-1",
          "17084-12"
        ],
        "known_not_affected": [
          "17086-3",
          "17086-8",
          "17084-10",
          "17086-6",
          "17084-17",
          "17084-16"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25629 c-ares out of bounds read in ares__read_line() - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-25629.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "21.1.2-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-19"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "18.20.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-20",
            "17086-9"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "1.42.0-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-18",
            "17086-5"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "2.2.3-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-21",
            "17086-7"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "18.2.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-23",
            "17084-12"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "23.9.1-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-14"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "20.14.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-22",
            "17084-11"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "3.0.6-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-15",
            "17084-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "1.30.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-13",
            "17084-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-02-26T00:00:00.000Z",
          "details": "1.19.1-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-4"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 5.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "17086-19",
            "17086-20",
            "17086-18",
            "17086-21",
            "17084-23",
            "17084-14",
            "17084-22",
            "17084-15",
            "17084-13",
            "17086-4",
            "17086-9",
            "17084-2",
            "17084-11",
            "17086-7",
            "17086-5",
            "17084-1",
            "17084-12"
          ]
        }
      ],
      "title": "c-ares out of bounds read in ares__read_line()"
    }
  ]
}
  gsd-2024-25629
Vulnerability from gsd
{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2024-25629"
      ],
      "details": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
      "id": "GSD-2024-25629",
      "modified": "2024-02-09T06:02:34.340746Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security-advisories@github.com",
        "ID": "CVE-2024-25629",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "c-ares",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "\u003c 1.27.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "c-ares"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-127",
                "lang": "eng",
                "value": "CWE-127: Buffer Under-read"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q",
            "refsource": "MISC",
            "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
          },
          {
            "name": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183",
            "refsource": "MISC",
            "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
          }
        ]
      },
      "source": {
        "advisory": "GHSA-mg26-v6qh-x48q",
        "discovery": "UNKNOWN"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist."
          },
          {
            "lang": "es",
            "value": "c-ares es una librer\u00eda C para solicitudes DNS asincr\u00f3nicas. `ares__read_line()` se usa para analizar archivos de configuraci\u00f3n locales como `/etc/resolv.conf`, `/etc/nsswitch.conf`, el archivo `HOSTALIASES` y si se usa una versi\u00f3n de c-ares anterior a 1.27. 0, el archivo `/etc/hosts`. Si alguno de estos archivos de configuraci\u00f3n tiene un car\u00e1cter \"NULL\" incrustado como primer car\u00e1cter en una nueva l\u00ednea, puede provocar que se intente leer la memoria antes del inicio del b\u00fafer dado, lo que puede provocar un bloqueo. Este problema se solucion\u00f3 en c-ares 1.27.0. No existen workarounds."
          }
        ],
        "id": "CVE-2024-25629",
        "lastModified": "2024-04-19T23:15:09.613",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "HIGH",
                "baseScore": 4.4,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "HIGH",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 0.8,
              "impactScore": 3.6,
              "source": "security-advisories@github.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-02-23T15:15:09.237",
        "references": [
          {
            "source": "security-advisories@github.com",
            "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/"
          }
        ],
        "sourceIdentifier": "security-advisories@github.com",
        "vulnStatus": "Awaiting Analysis",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-127"
              }
            ],
            "source": "security-advisories@github.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.