SUSE-SU-2021:2327-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:2327-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:2327-1
Related
Published
2021-07-14T15:08:17Z
Modified
2021-07-14T15:08:17Z
Summary
Security update for nodejs12
Details

This update for nodejs12 fixes the following issues:

  • update to 12.22.2:
  • CVE-2021-22918: Out of bounds read (bsc#1187973)
  • CVE-2021-23362: ssri Regular Expression Denial of Service and hosted-git-info (bsc#1187977)
  • CVE-2021-27290: Regular Expression Denial of Service (bsc#1187976)
  • CVE-2021-3450: OpenSSL - CA certificate check bypass with X509VFLAGX509STRICT (bsc#1183851)
  • CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)
  • CVE-2020-7774: npm - Update y18n to fix Prototype-Pollution (bsc#1184450)
References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 15 SP2 / nodejs12

Package

Name
nodejs12
Purl
purl:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.22.2-4.16.1

Ecosystem specific

{
    "binaries": [
        {
            "nodejs12": "12.22.2-4.16.1",
            "nodejs12-docs": "12.22.2-4.16.1",
            "nodejs12-devel": "12.22.2-4.16.1",
            "npm12": "12.22.2-4.16.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Web and Scripting 15 SP3 / nodejs12

Package

Name
nodejs12
Purl
purl:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.22.2-4.16.1

Ecosystem specific

{
    "binaries": [
        {
            "nodejs12": "12.22.2-4.16.1",
            "nodejs12-docs": "12.22.2-4.16.1",
            "nodejs12-devel": "12.22.2-4.16.1",
            "npm12": "12.22.2-4.16.1"
        }
    ]
}