RHSA-2023:5533
Vulnerability from csaf_redhat
Published
2023-10-09 10:29
Modified
2025-10-10 14:32
Summary
Red Hat Security Advisory: nodejs security, bug fix, and enhancement update

Notes

Topic
An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The package has been upgraded to a later upstream version: nodejs (16.20.2). Security Fix(es): * nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002) * c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936) * nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581) * nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588) * nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589) * nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590) * nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006) * nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559) * Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920) * Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs: Rebase to the latest Nodejs 16 release [rhel-9] (BZ#2236435, BZ#2178078, BZ#2223335)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe package has been upgraded to a later upstream version: nodejs (16.20.2).\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)\n\n* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)\n\n* Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)\n\n* nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)\n\n* nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)\n\n* nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)\n\n* nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\n* Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)\n\n* Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs: Rebase to the latest Nodejs 16 release [rhel-9] (BZ#2236435, BZ#2178078, BZ#2223335)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:5533",
        "url": "https://access.redhat.com/errata/RHSA-2023:5533"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2165824",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165824"
      },
      {
        "category": "external",
        "summary": "2168631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168631"
      },
      {
        "category": "external",
        "summary": "2172190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172190"
      },
      {
        "category": "external",
        "summary": "2172204",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172204"
      },
      {
        "category": "external",
        "summary": "2172217",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172217"
      },
      {
        "category": "external",
        "summary": "2178078",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178078"
      },
      {
        "category": "external",
        "summary": "2219824",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824"
      },
      {
        "category": "external",
        "summary": "2219838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838"
      },
      {
        "category": "external",
        "summary": "2219841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841"
      },
      {
        "category": "external",
        "summary": "2219842",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842"
      },
      {
        "category": "external",
        "summary": "2223335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223335"
      },
      {
        "category": "external",
        "summary": "2230948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
      },
      {
        "category": "external",
        "summary": "2230955",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
      },
      {
        "category": "external",
        "summary": "2230956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
      },
      {
        "category": "external",
        "summary": "2236435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236435"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5533.json"
      }
    ],
    "title": "Red Hat Security Advisory: nodejs security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T14:32:18+00:00",
      "generator": {
        "date": "2025-10-10T14:32:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:5533",
      "initial_release_date": "2023-10-09T10:29:45+00:00",
      "revision_history": [
        {
          "date": "2023-10-09T10:29:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-10-09T10:29:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T14:32:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-1.el9_0.src",
                "product": {
                  "name": "nodejs-1:16.20.2-1.el9_0.src",
                  "product_id": "nodejs-1:16.20.2-1.el9_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-1.el9_0?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-libs-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-1.el9_0?arch=aarch64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
                  "product_id": "npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-1.el9_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-libs-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64",
                  "product_id": "npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-1.el9_0?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-1.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-1.el9_0.i686",
                  "product_id": "nodejs-libs-1:16.20.2-1.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-1.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-1.el9_0.i686",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-1.el9_0.i686",
                  "product_id": "nodejs-debugsource-1:16.20.2-1.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-1.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
                  "product_id": "nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-1.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-1.el9_0?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-libs-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
                "product": {
                  "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
                  "product_id": "npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
                "product": {
                  "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
                  "product_id": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@16.20.2-1.el9_0?arch=s390x\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "nodejs-docs-1:16.20.2-1.el9_0.noarch",
                "product": {
                  "name": "nodejs-docs-1:16.20.2-1.el9_0.noarch",
                  "product_id": "nodejs-docs-1:16.20.2-1.el9_0.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-1.el9_0?arch=noarch\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src"
        },
        "product_reference": "nodejs-1:16.20.2-1.el9_0.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-1.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-debugsource-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-docs-1:16.20.2-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch"
        },
        "product_reference": "nodejs-docs-1:16.20.2-1.el9_0.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686"
        },
        "product_reference": "nodejs-libs-1:16.20.2-1.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64"
        },
        "product_reference": "nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        },
        "product_reference": "npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4904",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2023-02-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2168631"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "c-ares: buffer overflow in config_sortlist() due to missing string length check",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this vulnerability is not important but moderate because exploiting the vulnerability can lead to a disruption of the availability of an application, yet doesn\u2019t compromise data integrity or confidentiality. The opportunity for disruption is further limited due to the requirement that an application allows an attacker to be able to input both untrusted and unvalidated data. Exploiting this flaw requires an application to use the library in such a way that would allow untrusted and unvalidated input to be passed directly to ares_set_sortlist by an attacker. In the event that this is able to occur, the impact to RHEL is limited to a crash of the application due to the protections offered by default in RHEL systems such as Stack Smashing Protection (SSP).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4904"
        },
        {
          "category": "external",
          "summary": "RHBZ#2168631",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168631"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4904",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4904",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4904"
        },
        {
          "category": "external",
          "summary": "https://github.com/c-ares/c-ares/issues/496",
          "url": "https://github.com/c-ares/c-ares/issues/496"
        }
      ],
      "release_date": "2022-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "c-ares: buffer overflow in config_sortlist() due to missing string length check"
    },
    {
      "cve": "CVE-2022-25881",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "discovery_date": "2023-01-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165824"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact of a succesfull exploiation of this vulnerability will only lead to a denial of service of the system,furthermore the exploitation will require an attacker to specifically craft a regular expression patterns in request headers (i.e. nontrivial input) that trigger pathological regex behavior but since most systems will have limits on header sizes or input validation that reduce the risk of triggering the extreme pathological regex cases which is why this has been marked as moderate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-25881"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165824",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165824"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25881",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25881",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25881"
        }
      ],
      "release_date": "2023-01-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability"
    },
    {
      "cve": "CVE-2023-23920",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "discovery_date": "2023-02-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2172217"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An untrusted search path vulnerability exists in Node.js. \u003c19.6.1, \u003c18.14.1, \u003c16.19.1, and \u003c14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Node.js: insecure loading of ICU data through ICU_DATA environment variable",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-23920"
        },
        {
          "category": "external",
          "summary": "RHBZ#2172217",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172217"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23920",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23920",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23920"
        }
      ],
      "release_date": "2023-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Node.js: insecure loading of ICU data through ICU_DATA environment variable"
    },
    {
      "cve": "CVE-2023-23936",
      "cwe": {
        "id": "CWE-93",
        "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
      },
      "discovery_date": "2023-02-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2172190"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the fetch API in Node.js that did not prevent CRLF injection in the \u0027host\u0027 header. This issue could allow HTTP response splitting and HTTP header injection.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Node.js: Fetch API did not protect against CRLF injection in host headers",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-23936"
        },
        {
          "category": "external",
          "summary": "RHBZ#2172190",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172190"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23936",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23936",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23936"
        }
      ],
      "release_date": "2023-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Node.js: Fetch API did not protect against CRLF injection in host headers"
    },
    {
      "cve": "CVE-2023-24807",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "discovery_date": "2023-02-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2172204"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Node.js: Regular Expression Denial of Service in Headers fetch API",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24807"
        },
        {
          "category": "external",
          "summary": "RHBZ#2172204",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172204"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24807",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24807",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24807"
        }
      ],
      "release_date": "2023-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Node.js: Regular Expression Denial of Service in Headers fetch API"
    },
    {
      "cve": "CVE-2023-30581",
      "discovery_date": "2023-06-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2219824"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability has been discovered in Node.js,  where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: mainModule.proto bypass experimental policy mechanism",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated as an IMPORTANT severity because this vulnerability is a policy bypass resulting from the improper handling of the JavaScript prototype chain. A malicious actor can trigger this flaw by using process.mainModule.__proto__.require() to load and execute modules explicitly disallowed by the policy.json configuration.\n\nSuccessful exploitation allows for the execution of unauthorized code within the context of the application process, leading to a compromise of system integrity.\n\nAt the time of this CVE\u0027s disclosure, the affected policy mechanism was designated as an experimental feature.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30581"
        },
        {
          "category": "external",
          "summary": "RHBZ#2219824",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30581",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30581"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581"
        }
      ],
      "release_date": "2023-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: mainModule.proto bypass experimental policy mechanism"
    },
    {
      "cve": "CVE-2023-30588",
      "discovery_date": "2023-06-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2219838"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: process interuption due to invalid Public Key information in x509 certificates",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30588"
        },
        {
          "category": "external",
          "summary": "RHBZ#2219838",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30588",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588"
        }
      ],
      "release_date": "2023-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: process interuption due to invalid Public Key information in x509 certificates"
    },
    {
      "cve": "CVE-2023-30589",
      "discovery_date": "2023-06-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2219841"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: HTTP Request Smuggling via Empty headers separated by CR",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability is in the llhttp parsing not using the CRLF sequence which violates the HTTP/1.1 specification, which mandates CRLF as the delimiter. While this might result in request smuggling, the added complexity of creating a valid malformed delimited request and having it reach the intended target and then processed,which is why this has been rated as moderate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30589"
        },
        {
          "category": "external",
          "summary": "RHBZ#2219841",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30589",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589"
        }
      ],
      "release_date": "2023-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: HTTP Request Smuggling via Empty headers separated by CR"
    },
    {
      "cve": "CVE-2023-30590",
      "discovery_date": "2023-06-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2219842"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: DiffieHellman do not generate keys after setting a private key",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The generateKeys() API function returned from crypto.createDiffieHellman() in Node.js does not behave as documented as the documentation states that the function \u201cgenerates private and public Diffie-Hellman key values.\u201d However, the actual implementation only generates a private key if one has not yet been set, and does not recompute or regenerate the public key if the private key was previously defined using setPrivateKey(), which is why this could only in theory, result in weak or predictable shared secrets. The issue at hand is a developer facing hazard caused by a mismatch in the documentation and application of the function, and is not in itself a security vulnerability, which is why Redhat has assessed this as moderate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30590"
        },
        {
          "category": "external",
          "summary": "RHBZ#2219842",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30590",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30590"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590"
        }
      ],
      "release_date": "2023-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: DiffieHellman do not generate keys after setting a private key"
    },
    {
      "cve": "CVE-2023-32002",
      "cwe": {
        "id": "CWE-1268",
        "name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents"
      },
      "discovery_date": "2023-08-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2230948"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: Permissions policies can be bypassed via Module._load",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-32002"
        },
        {
          "category": "external",
          "summary": "RHBZ#2230948",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002",
          "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"
        }
      ],
      "release_date": "2023-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: Permissions policies can be bypassed via Module._load"
    },
    {
      "cve": "CVE-2023-32006",
      "cwe": {
        "id": "CWE-213",
        "name": "Exposure of Sensitive Information Due to Incompatible Policies"
      },
      "discovery_date": "2023-08-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2230955"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-32006"
        },
        {
          "category": "external",
          "summary": "RHBZ#2230955",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006",
          "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"
        }
      ],
      "release_date": "2023-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()"
    },
    {
      "cve": "CVE-2023-32559",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2023-08-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2230956"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nodejs: Permissions policies can be bypassed via process.binding",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
          "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
          "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-32559"
        },
        {
          "category": "external",
          "summary": "RHBZ#2230956",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559"
        },
        {
          "category": "external",
          "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559",
          "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"
        }
      ],
      "release_date": "2023-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-09T10:29:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:5533"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.src",
            "AppStream-9.0.0.Z.EUS:nodejs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-debugsource-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-docs-1:16.20.2-1.el9_0.noarch",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-full-i18n-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.i686",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:nodejs-libs-debuginfo-1:16.20.2-1.el9_0.x86_64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.aarch64",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.ppc64le",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.s390x",
            "AppStream-9.0.0.Z.EUS:npm-1:8.19.4-1.16.20.2.1.el9_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nodejs: Permissions policies can be bypassed via process.binding"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…