Action not permitted
Modal body text goes here.
cve-2024-22020
Vulnerability from cvelistv5
Published
2024-07-09 01:07
Modified
2024-11-22 12:04
Severity ?
EPSS score ?
Summary
A security flaw in Node.js allows a bypass of network import restrictions.
By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.
Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.
Exploiting this flaw can violate network import security, posing a risk to developers and servers.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nodejs", "vendor": "nodejs", "versions": [ { "status": "affected", "version": "21.6.1" }, { "status": "affected", "version": "20.11.0" }, { "status": "affected", "version": "18.19.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22020", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-13T03:55:30.015268Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T17:48:27.567Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-11-22T12:04:47.763Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/2092749" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/19/3" }, { "url": "https://security.netapp.com/advisory/ntap-20241122-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Node.js", "vendor": "Node.js", "versions": [ { "lessThanOrEqual": "21.6.1", "status": "affected", "version": "21.6.1", "versionType": "semver" }, { "lessThanOrEqual": "20.11.0", "status": "affected", "version": "20.11.0", "versionType": "semver" }, { "lessThanOrEqual": "18.19.0", "status": "affected", "version": "18.19.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A security flaw in Node.js allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T01:07:28.098Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/2092749" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/19/3" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-22020", "datePublished": "2024-07-09T01:07:28.098Z", "dateReserved": "2024-01-04T01:04:06.574Z", "dateUpdated": "2024-11-22T12:04:47.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-22020\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2024-07-09T02:15:09.973\",\"lastModified\":\"2024-11-22T12:15:18.453\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security flaw in Node.js allows a bypass of network import restrictions.\\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\\nExploiting this flaw can violate network import security, posing a risk to developers and servers.\"},{\"lang\":\"es\",\"value\":\"Un fallo de seguridad en Node.js permite eludir las restricciones de importaci\u00f3n de la red. Al incorporar importaciones fuera de la red en las URL de datos, un atacante puede ejecutar c\u00f3digo arbitrario, comprometiendo la seguridad del sistema. Verificada en varias plataformas, la vulnerabilidad se mitiga al prohibir las URL de datos en las importaciones de red. La explotaci\u00f3n de este fallo puede violar la seguridad de importaci\u00f3n de la red, lo que representa un riesgo para los desarrolladores y servidores.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.5}]},\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/11/6\",\"source\":\"support@hackerone.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/19/3\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://hackerone.com/reports/2092749\",\"source\":\"support@hackerone.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/11/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/19/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://hackerone.com/reports/2092749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20241122-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-ch4x-f5c4-36gv
Vulnerability from github
Published
2024-07-09 03:31
Modified
2024-11-22 12:39
Severity ?
Details
A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.
{ "affected": [], "aliases": [ "CVE-2024-22020" ], "database_specific": { "cwe_ids": [ "CWE-284" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-09T02:15:09Z", "severity": "MODERATE" }, "details": "A security flaw in Node.js allows a bypass of network import restrictions.\nBy embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.\nVerified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.\nExploiting this flaw can violate network import security, posing a risk to developers and servers.", "id": "GHSA-ch4x-f5c4-36gv", "modified": "2024-11-22T12:39:08Z", "published": "2024-07-09T03:31:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020" }, { "type": "WEB", "url": "https://hackerone.com/reports/2092749" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20241122-0006" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/07/19/3" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2024_6148
Vulnerability from csaf_redhat
Published
2024-09-03 02:32
Modified
2024-12-10 17:05
Summary
Red Hat Security Advisory: nodejs:18 security update
Notes
Topic
An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)\n\n* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6148", "url": "https://access.redhat.com/errata/RHSA-2024:6148" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6148.json" } ], "title": "Red Hat Security Advisory: nodejs:18 security update", "tracking": { "current_release_date": "2024-12-10T17:05:06+00:00", "generator": { "date": "2024-12-10T17:05:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:6148", "initial_release_date": "2024-09-03T02:32:16+00:00", "revision_history": [ { "date": "2024-09-03T02:32:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T02:32:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-10T17:05:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:18:8100020240807161023:489197e6", "product": { "name": "nodejs:18:8100020240807161023:489197e6", "product_id": "nodejs:18:8100020240807161023:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@18:8100020240807161023:489197e6" } } }, { "category": "product_version", "name": "nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "product": { "name": "nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "product_id": "nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.10.0%2B21159%2Bf5a7145d?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19439%2B7b18b275?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B19439%2B7b18b275?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "product": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "product_id": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.10.0%2B21159%2Bf5a7145d?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19439%2B7b18b275?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel8.10.0%2B22199%2B56ea0ead?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, "product_reference": "nodejs:18:8100020240807161023:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src" }, "product_reference": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch" }, "product_reference": "nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch" }, "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64 as a component of nodejs:18:8100020240807161023:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22020", "discovery_date": "2024-07-09T02:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296417" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Bypass network import restriction via data URL", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is categorized as moderate severity rather than high due to its specific conditions for exploitation and impact scope. While the flaw permits bypassing network import restrictions via data URLs to execute arbitrary code, its exploitation is contingent on the attacker\u2019s ability to inject and execute code within a controlled environment. The impact is constrained to scenarios where the vulnerable application processes data URLs and lacks robust validation mechanisms. Additionally, this issue requires the attacker to exploit specific code paths and permissions, which limits its widespread applicability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22020" }, { "category": "external", "summary": "RHBZ#2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020" }, { "category": "external", "summary": "https://hackerone.com/reports/2092749", "url": "https://hackerone.com/reports/2092749" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T02:32:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Bypass network import restriction via data URL" }, { "cve": "CVE-2024-28863", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293200" } ], "notes": [ { "category": "description", "text": "A flaw was found in ISAACS\u0027s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28863" }, { "category": "external", "summary": "RHBZ#2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863" }, { "category": "external", "summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36", "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20240524-0005/", "url": "https://security.netapp.com/advisory/ntap-20240524-0005/" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T02:32:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debuginfo-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-debugsource-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-devel-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-docs-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-full-i18n-1:18.20.4-1.module+el8.10.0+22199+56ea0ead.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+21159+f5a7145d.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19439+7b18b275.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19439+7b18b275.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:18:8100020240807161023:489197e6:npm-1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation" } ] }
rhsa-2024_5815
Vulnerability from csaf_redhat
Published
2024-08-26 08:12
Modified
2024-11-24 18:16
Summary
Red Hat Security Advisory: nodejs:20 security update
Notes
Topic
An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
* nodejs: fs.lstat bypasses permission model (CVE-2024-22018)
* nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)\n\n* nodejs: fs.lstat bypasses permission model (CVE-2024-22018)\n\n* nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5815", "url": "https://access.redhat.com/errata/RHSA-2024:5815" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "2296990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296990" }, { "category": "external", "summary": "2299281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299281" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5815.json" } ], "title": "Red Hat Security Advisory: nodejs:20 security update", "tracking": { "current_release_date": "2024-11-24T18:16:55+00:00", "generator": { "date": "2024-11-24T18:16:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:5815", "initial_release_date": "2024-08-26T08:12:15+00:00", "revision_history": [ { "date": "2024-08-26T08:12:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T08:12:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T18:16:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:20:9040020240807145403:rhel9", "product": { "name": "nodejs:20:9040020240807145403:rhel9", "product_id": "nodejs:20:9040020240807145403:rhel9", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@20:9040020240807145403:rhel9" } } }, { "category": "product_version", "name": "nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "product": { "name": "nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "product_id": "nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "product": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "product_id": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0.z%2B20478%2B84a9f781?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "product_id": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.3.0%2B19518%2B63aad52d?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel9.4.0%2B22197%2B9e60f127?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, "product_reference": "nodejs:20:9040020240807145403:rhel9", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src" }, "product_reference": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch" }, "product_reference": "nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch" }, "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64 as a component of nodejs:20:9040020240807145403:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22018", "discovery_date": "2024-07-10T02:20:15+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296990" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: fs.lstat bypasses permission model", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22018" }, { "category": "external", "summary": "RHBZ#2296990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22018" }, { "category": "external", "summary": "https://hackerone.com/reports/2145862", "url": "https://hackerone.com/reports/2145862" } ], "release_date": "2024-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:12:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5815" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: fs.lstat bypasses permission model" }, { "cve": "CVE-2024-22020", "discovery_date": "2024-07-09T02:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296417" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Bypass network import restriction via data URL", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is categorized as moderate severity rather than high due to its specific conditions for exploitation and impact scope. While the flaw permits bypassing network import restrictions via data URLs to execute arbitrary code, its exploitation is contingent on the attacker\u2019s ability to inject and execute code within a controlled environment. The impact is constrained to scenarios where the vulnerable application processes data URLs and lacks robust validation mechanisms. Additionally, this issue requires the attacker to exploit specific code paths and permissions, which limits its widespread applicability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22020" }, { "category": "external", "summary": "RHBZ#2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020" }, { "category": "external", "summary": "https://hackerone.com/reports/2092749", "url": "https://hackerone.com/reports/2092749" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:12:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5815" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Bypass network import restriction via data URL" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2024-07-22T14:03:28+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2299281" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \"read-only\" file descriptor to change the owner and permissions of a file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: fs.fchown/fchmod bypasses permission model", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is specific to the Permission Model, which is currently an experimental feature of Node.js.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-36137" }, { "category": "external", "summary": "RHBZ#2299281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299281" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-36137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36137" } ], "release_date": "2024-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:12:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5815" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debuginfo-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-debugsource-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-devel-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-docs-1:20.16.0-1.module+el9.4.0+22197+9e60f127.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-full-i18n-1:20.16.0-1.module+el9.4.0+22197+9e60f127.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0.z+20478+84a9f781.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-0:2021.06-4.module+el9.3.0+19518+63aad52d.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.3.0+19518+63aad52d.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:20:9040020240807145403:rhel9:npm-1:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: fs.fchown/fchmod bypasses permission model" } ] }
rhsa-2024_6147
Vulnerability from csaf_redhat
Published
2024-09-03 02:29
Modified
2024-12-10 17:05
Summary
Red Hat Security Advisory: nodejs:18 security update
Notes
Topic
An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)\n\n* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6147", "url": "https://access.redhat.com/errata/RHSA-2024:6147" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6147.json" } ], "title": "Red Hat Security Advisory: nodejs:18 security update", "tracking": { "current_release_date": "2024-12-10T17:05:17+00:00", "generator": { "date": "2024-12-10T17:05:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:6147", "initial_release_date": "2024-09-03T02:29:11+00:00", "revision_history": [ { "date": "2024-09-03T02:29:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T02:29:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-10T17:05:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:18:9040020240807131341:rhel9", "product": { "name": "nodejs:18:9040020240807131341:rhel9", "product_id": "nodejs:18:9040020240807131341:rhel9", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@18:9040020240807131341:rhel9" } } }, { "category": "product_version", "name": "nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "product": { "name": "nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "product_id": "nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "product": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "product_id": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.3.0%2B19762%2Bd716bf3b?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "product_id": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.1.0%2B15718%2Be52ec601?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_id": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_id": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@18.20.4-1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64", "product": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64", "product_id": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.7.0-1.18.20.4.1.module%2Bel9.4.0%2B22195%2Bc221878e?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, "product_reference": "nodejs:18:9040020240807131341:rhel9", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src" }, "product_reference": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch" }, "product_reference": "nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch" }, "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64 as a component of nodejs:18:9040020240807131341:rhel9 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" }, "product_reference": "npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22020", "discovery_date": "2024-07-09T02:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296417" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Bypass network import restriction via data URL", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is categorized as moderate severity rather than high due to its specific conditions for exploitation and impact scope. While the flaw permits bypassing network import restrictions via data URLs to execute arbitrary code, its exploitation is contingent on the attacker\u2019s ability to inject and execute code within a controlled environment. The impact is constrained to scenarios where the vulnerable application processes data URLs and lacks robust validation mechanisms. Additionally, this issue requires the attacker to exploit specific code paths and permissions, which limits its widespread applicability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22020" }, { "category": "external", "summary": "RHBZ#2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020" }, { "category": "external", "summary": "https://hackerone.com/reports/2092749", "url": "https://hackerone.com/reports/2092749" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T02:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6147" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Bypass network import restriction via data URL" }, { "cve": "CVE-2024-28863", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293200" } ], "notes": [ { "category": "description", "text": "A flaw was found in ISAACS\u0027s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28863" }, { "category": "external", "summary": "RHBZ#2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863" }, { "category": "external", "summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36", "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20240524-0005/", "url": "https://security.netapp.com/advisory/ntap-20240524-0005/" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T02:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6147" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debuginfo-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-debugsource-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-devel-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-docs-1:18.20.4-1.module+el9.4.0+22195+c221878e.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-full-i18n-1:18.20.4-1.module+el9.4.0+22195+c221878e.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-nodemon-0:3.0.1-1.module+el9.3.0+19762+d716bf3b.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-0:2021.06-4.module+el9.1.0+15718+e52ec601.src", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:nodejs-packaging-bundler-0:2021.06-4.module+el9.1.0+15718+e52ec601.noarch", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.s390x", "AppStream-9.4.0.Z.MAIN.EUS:nodejs:18:9040020240807131341:rhel9:npm-1:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation" } ] }
rhsa-2024_5814
Vulnerability from csaf_redhat
Published
2024-08-26 08:36
Modified
2024-12-10 17:04
Summary
Red Hat Security Advisory: nodejs:20 security update
Notes
Topic
An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
* nodejs: fs.lstat bypasses permission model (CVE-2024-22018)
* nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)\n\n* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)\n\n* nodejs: fs.lstat bypasses permission model (CVE-2024-22018)\n\n* nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5814", "url": "https://access.redhat.com/errata/RHSA-2024:5814" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "2296990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296990" }, { "category": "external", "summary": "2299281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299281" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5814.json" } ], "title": "Red Hat Security Advisory: nodejs:20 security update", "tracking": { "current_release_date": "2024-12-10T17:04:07+00:00", "generator": { "date": "2024-12-10T17:04:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:5814", "initial_release_date": "2024-08-26T08:36:35+00:00", "revision_history": [ { "date": "2024-08-26T08:36:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T08:36:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-10T17:04:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:20:8100020240808073736:489197e6", "product": { "name": "nodejs:20:8100020240808073736:489197e6", "product_id": "nodejs:20:8100020240808073736:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@20:8100020240808073736:489197e6" } } }, { "category": "product_version", "name": "nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "product": { "name": "nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "product_id": "nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "product": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "product_id": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "product": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.9.0%2B20473%2Bc4e3d824?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "product": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "product_id": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel8.9.0%2B19519%2Be25b965a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@20.16.0-1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64", "product": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64", "product_id": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@10.8.1-1.20.16.0.1.module%2Bel8.10.0%2B22203%2Ba88c8310?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, "product_reference": "nodejs:20:8100020240808073736:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src" }, "product_reference": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch" }, "product_reference": "nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src" }, "product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src" }, "product_reference": "nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch" }, "product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64 as a component of nodejs:20:8100020240808073736:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" }, "product_reference": "npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22018", "discovery_date": "2024-07-10T02:20:15+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296990" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files they do not have explicit read access to.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: fs.lstat bypasses permission model", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22018" }, { "category": "external", "summary": "RHBZ#2296990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22018" }, { "category": "external", "summary": "https://hackerone.com/reports/2145862", "url": "https://hackerone.com/reports/2145862" } ], "release_date": "2024-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5814" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: fs.lstat bypasses permission model" }, { "cve": "CVE-2024-22020", "discovery_date": "2024-07-09T02:20:08+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2296417" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Node.js package. By embedding non-network imports in data URLs, this flaw allows an attacker to execute arbitrary code, compromising system security.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Bypass network import restriction via data URL", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is categorized as moderate severity rather than high due to its specific conditions for exploitation and impact scope. While the flaw permits bypassing network import restrictions via data URLs to execute arbitrary code, its exploitation is contingent on the attacker\u2019s ability to inject and execute code within a controlled environment. The impact is constrained to scenarios where the vulnerable application processes data URLs and lacks robust validation mechanisms. Additionally, this issue requires the attacker to exploit specific code paths and permissions, which limits its widespread applicability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22020" }, { "category": "external", "summary": "RHBZ#2296417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22020" }, { "category": "external", "summary": "https://hackerone.com/reports/2092749", "url": "https://hackerone.com/reports/2092749" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5814" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Bypass network import restriction via data URL" }, { "cve": "CVE-2024-28863", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293200" } ], "notes": [ { "category": "description", "text": "A flaw was found in ISAACS\u0027s node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28863" }, { "category": "external", "summary": "RHBZ#2293200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863" }, { "category": "external", "summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36", "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20240524-0005/", "url": "https://security.netapp.com/advisory/ntap-20240524-0005/" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5814" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2024-07-22T14:03:28+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2299281" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. The Node.js Permission Model does not operate on file descriptors. However, operations such as fs.fchown or fs.fchmod can use a \"read-only\" file descriptor to change the owner and permissions of a file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: fs.fchown/fchmod bypasses permission model", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is specific to the Permission Model, which is currently an experimental feature of Node.js.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-36137" }, { "category": "external", "summary": "RHBZ#2299281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299281" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-36137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36137" } ], "release_date": "2024-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T08:36:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5814" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debuginfo-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-debugsource-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-devel-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-docs-1:20.16.0-1.module+el8.10.0+22203+a88c8310.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-full-i18n-1:20.16.0-1.module+el8.10.0+22203+a88c8310.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-nodemon-0:3.0.1-1.module+el8.9.0+20473+c4e3d824.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-0:2021.06-4.module+el8.9.0+19519+e25b965a.src", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:nodejs-packaging-bundler-0:2021.06-4.module+el8.9.0+19519+e25b965a.noarch", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.s390x", "AppStream-8.10.0.Z.MAIN.EUS:nodejs:20:8100020240808073736:489197e6:npm-1:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: fs.fchown/fchmod bypasses permission model" } ] }
gsd-2024-22020
Vulnerability from gsd
Modified
2024-01-04 06:02
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-22020" ], "id": "GSD-2024-22020", "modified": "2024-01-04T06:02:16.680568Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-22020", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
wid-sec-w-2024-1548
Vulnerability from csaf_certbund
Published
2024-07-08 22:00
Modified
2024-10-31 23:00
Summary
Node.js: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Code auszuführen oder um Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Code auszuf\u00fchren oder um Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1548 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1548.json" }, { "category": "self", "summary": "WID-SEC-2024-1548 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1548" }, { "category": "external", "summary": "NodeJS Security Releases vom 2024-07-08", "url": "https://nodejs.org/en/blog/vulnerability/july-2024-security-releases" }, { "category": "external", "summary": "Securityonline.info Cybersecurity News", "url": "https://securityonline.info/cve-2024-36138-high-severity-vulnerability-in-node-js-allows-code-execution-on-windows/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2496-1 vom 2024-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018981.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2542-1 vom 2024-07-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018991.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2543-1 vom 2024-07-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018990.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2574-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019017.html" }, { "category": "external", "summary": "IBM Security Bulletin 7165870 vom 2024-08-19", "url": "https://www.ibm.com/support/pages/node/7165870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5814 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5814" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5815 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5815" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5814 vom 2024-08-26", "url": "https://linux.oracle.com/errata/ELSA-2024-5814.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5815 vom 2024-08-27", "url": "https://linux.oracle.com/errata/ELSA-2024-5815.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6147 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6147" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6148 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6148" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6147 vom 2024-09-05", "url": "https://linux.oracle.com/errata/ELSA-2024-6147.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6148 vom 2024-09-04", "url": "https://linux.oracle.com/errata/ELSA-2024-6148.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5814 vom 2024-09-17", "url": "https://errata.build.resf.org/RLSA-2024:5814" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5815 vom 2024-09-17", "url": "https://errata.build.resf.org/RLSA-2024:5815" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:6147 vom 2024-09-17", "url": "https://errata.build.resf.org/RLSA-2024:6147" }, { "category": "external", "summary": "IBM Security Bulletin 7172688 vom 2024-10-09", "url": "https://www.ibm.com/support/pages/node/7172688" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14435-1 vom 2024-10-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OWCPL7VTEVIGUDVKLEV2D2ITNTWKC4AZ/" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-31T23:00:00.000+00:00", "generator": { "date": "2024-11-01T09:14:41.883+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1548", "initial_release_date": "2024-07-08T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "2", "summary": "Korrektur: CVE-2024-27980 hier falsch referenziert" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "branches": [ { "category": "product_version", "name": "9.6", "product": { "name": "IBM Rational Application Developer for WebSphere Software 9.6", "product_id": "T012259", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_application_developer_for_websphere_software:9.6" } } }, { "category": "product_version", "name": "9.7", "product": { "name": "IBM Rational Application Developer for WebSphere Software 9.7", "product_id": "T033489", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_application_developer_for_websphere_software:9.7" } } } ], "category": "product_name", "name": "Rational Application Developer for WebSphere Software" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c18.20.4", "product": { "name": "Open Source Node.js \u003c18.20.4", "product_id": "T035875" } }, { "category": "product_version", "name": "18.20.4", "product": { "name": "Open Source Node.js 18.20.4", "product_id": "T035875-fixed", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:18.20.4" } } }, { "category": "product_version_range", "name": "\u003c20.15.1", "product": { "name": "Open Source Node.js \u003c20.15.1", "product_id": "T035876" } }, { "category": "product_version", "name": "20.15.1", "product": { "name": "Open Source Node.js 20.15.1", "product_id": "T035876-fixed", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:20.15.1" } } }, { "category": "product_version_range", "name": "\u003c22.4.1", "product": { "name": "Open Source Node.js \u003c22.4.1", "product_id": "T035877" } }, { "category": "product_version", "name": "22.4.1", "product": { "name": "Open Source Node.js 22.4.1", "product_id": "T035877-fixed", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:22.4.1" } } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22018", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Node.js aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Batch-Dateien, einer unsachgem\u00e4\u00dfen Netzwerk-Importbeschr\u00e4nkung und einer fehlerhaften Rechteverwaltung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T035877", "T035876", "T033489", "T035875", "T002207", "67646", "T019704", "T012259", "T027843", "T004914", "T032255" ] }, "release_date": "2024-07-08T22:00:00.000+00:00", "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Node.js aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Batch-Dateien, einer unsachgem\u00e4\u00dfen Netzwerk-Importbeschr\u00e4nkung und einer fehlerhaften Rechteverwaltung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T035877", "T035876", "T033489", "T035875", "T002207", "67646", "T019704", "T012259", "T027843", "T004914", "T032255" ] }, "release_date": "2024-07-08T22:00:00.000+00:00", "title": "CVE-2024-22020" }, { "cve": "CVE-2024-36137", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Node.js aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Batch-Dateien, einer unsachgem\u00e4\u00dfen Netzwerk-Importbeschr\u00e4nkung und einer fehlerhaften Rechteverwaltung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T035877", "T035876", "T033489", "T035875", "T002207", "67646", "T019704", "T012259", "T027843", "T004914", "T032255" ] }, "release_date": "2024-07-08T22:00:00.000+00:00", "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Node.js aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Batch-Dateien, einer unsachgem\u00e4\u00dfen Netzwerk-Importbeschr\u00e4nkung und einer fehlerhaften Rechteverwaltung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T035877", "T035876", "T033489", "T035875", "T002207", "67646", "T019704", "T012259", "T027843", "T004914", "T032255" ] }, "release_date": "2024-07-08T22:00:00.000+00:00", "title": "CVE-2024-36138" }, { "cve": "CVE-2024-37372", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Node.js aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Batch-Dateien, einer unsachgem\u00e4\u00dfen Netzwerk-Importbeschr\u00e4nkung und einer fehlerhaften Rechteverwaltung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen oder beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T035877", "T035876", "T033489", "T035875", "T002207", "67646", "T019704", "T012259", "T027843", "T004914", "T032255" ] }, "release_date": "2024-07-08T22:00:00.000+00:00", "title": "CVE-2024-37372" } ] }
wid-sec-w-2024-3195
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3195 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json" }, { "category": "self", "summary": "WID-SEC-2024-3195 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-15T22:00:00.000+00:00", "generator": { "date": "2024-10-16T10:12:35.400+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-3195", "initial_release_date": "2024-10-15T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.1.1.3.0", "product": { "name": "Oracle Communications 9.1.1.3.0", "product_id": "T027333", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.3.0" } } }, { "category": "product_version", "name": "12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } }, { "category": "product_version", "name": "5.1", "product": { "name": "Oracle Communications 5.1", "product_id": "T028684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.1" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version", "name": "23.4.0", "product": { "name": "Oracle Communications 23.4.0", "product_id": "T032091", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.0" } } }, { "category": "product_version", "name": "23.4.2", "product": { "name": "Oracle Communications 23.4.2", "product_id": "T034144", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.2" } } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version", "name": "24.1.0.0.0", "product": { "name": "Oracle Communications 24.1.0.0.0", "product_id": "T034147", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0.0.0" } } }, { "category": "product_version", "name": "23.4.3", "product": { "name": "Oracle Communications 23.4.3", "product_id": "T036195", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.3" } } }, { "category": "product_version", "name": "23.4.4", "product": { "name": "Oracle Communications 23.4.4", "product_id": "T036196", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.4" } } }, { "category": "product_version_range", "name": "\u003c=24.2.0", "product": { "name": "Oracle Communications \u003c=24.2.0", "product_id": "T036197" } }, { "category": "product_version_range", "name": "\u003c=24.2.0", "product": { "name": "Oracle Communications \u003c=24.2.0", "product_id": "T036197-fixed" } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version", "name": "12.11.0", "product": { "name": "Oracle Communications 12.11.0", "product_id": "T036209", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.0" } } }, { "category": "product_version", "name": "9.0.1.10.0", "product": { "name": "Oracle Communications 9.0.1.10.0", "product_id": "T038373", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1.10.0" } } }, { "category": "product_version_range", "name": "\u003c=23.4.5", "product": { "name": "Oracle Communications \u003c=23.4.5", "product_id": "T038375" } }, { "category": "product_version_range", "name": "\u003c=23.4.5", "product": { "name": "Oracle Communications \u003c=23.4.5", "product_id": "T038375-fixed" } }, { "category": "product_version", "name": "24.2.1", "product": { "name": "Oracle Communications 24.2.1", "product_id": "T038376", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.1" } } }, { "category": "product_version_range", "name": "\u003c=23.4.6", "product": { "name": "Oracle Communications \u003c=23.4.6", "product_id": "T038377" } }, { "category": "product_version_range", "name": "\u003c=23.4.6", "product": { "name": "Oracle Communications \u003c=23.4.6", "product_id": "T038377-fixed" } }, { "category": "product_version", "name": "24.1.1", "product": { "name": "Oracle Communications 24.1.1", "product_id": "T038378", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.1" } } }, { "category": "product_version", "name": "24.2.2", "product": { "name": "Oracle Communications 24.2.2", "product_id": "T038379", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.2" } } }, { "category": "product_version", "name": "9.1.5", "product": { "name": "Oracle Communications 9.1.5", "product_id": "T038380", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.5" } } }, { "category": "product_version", "name": "9.1.0", "product": { "name": "Oracle Communications 9.1.0", "product_id": "T038381", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.0" } } }, { "category": "product_version", "name": "14", "product": { "name": "Oracle Communications 14.0", "product_id": "T038382", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0" } } }, { "category": "product_version", "name": "9.1.1.9.0", "product": { "name": "Oracle Communications 9.1.1.9.0", "product_id": "T038383", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.9.0" } } }, { "category": "product_version", "name": "14.0.0.1", "product": { "name": "Oracle Communications 14.0.0.1", "product_id": "T038384", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0.0.1" } } }, { "category": "product_version", "name": "17.0.1", "product": { "name": "Oracle Communications 17.0.1", "product_id": "T038385", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:17.0.1" } } }, { "category": "product_version_range", "name": "\u003c10.4.0.4", "product": { "name": "Oracle Communications \u003c10.4.0.4", "product_id": "T038386" } }, { "category": "product_version", "name": "10.4.0.4", "product": { "name": "Oracle Communications 10.4.0.4", "product_id": "T038386-fixed", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4" } } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8.0", "product": { "name": "Oracle Communications \u003c=9.1.1.8.0", "product_id": "T038426" } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8.0", "product": { "name": "Oracle Communications \u003c=9.1.1.8.0", "product_id": "T038426-fixed" } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-2601", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-2601" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2023-2953", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-38408", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-38408" }, { "cve": "CVE-2023-4043", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-4043" }, { "cve": "CVE-2023-46136", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-46136" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-51775" }, { "cve": "CVE-2023-5685", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-5685" }, { "cve": "CVE-2023-6597", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6816", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0450", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-22020", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22257", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-23672" }, { "cve": "CVE-2024-2398", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-2398" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25638", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-25638" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-26308" }, { "cve": "CVE-2024-28182", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29736", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29736" }, { "cve": "CVE-2024-29857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30251", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-30251" }, { "cve": "CVE-2024-31080", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-31080" }, { "cve": "CVE-2024-31744", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-31744" }, { "cve": "CVE-2024-32760", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-32760" }, { "cve": "CVE-2024-33602", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37371", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38816", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-38816" }, { "cve": "CVE-2024-40898", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-40898" }, { "cve": "CVE-2024-43044", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-43044" }, { "cve": "CVE-2024-45492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-45492" }, { "cve": "CVE-2024-4577", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-4603" }, { "cve": "CVE-2024-5971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-5971" }, { "cve": "CVE-2024-6162", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6387", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-6387" }, { "cve": "CVE-2024-7254", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "T036206", "T036207", "T036208", "T034147", "T038386", "T034146", "T034145", "T034144", "T038382", "T038383", "T038384", "T038385", "T038380", "T038381", "T027338", "T027333", "T028684", "T038379", "T038376", "T038378", "T036195", "T038373", "T036196", "T032090", "T032091" ], "last_affected": [ "T038426", "T036197", "T038375", "T038377" ] }, "release_date": "2024-10-15T22:00:00.000+00:00", "title": "CVE-2024-7254" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.