File _patchinfo of Package patchinfo.22396
<patchinfo incident="22396">
<issue tracker="bnc" id="1190053">VUL-0: CVE-2021-39135: nodejs6,nodejs8,nodejs4,nodejs10,nodejs14,nodejs12: nodejs-arborist - symlink following vulnerability</issue>
<issue tracker="bnc" id="1190054">VUL-0: CVE-2021-39134: nodejs4,nodejs6,nodejs8,nodejs14,nodejs12,nodejs10: nodejs-arborist: symlink following vulnerability</issue>
<issue tracker="bnc" id="1190055">VUL-0: CVE-2021-37713: nodejs12,nodejs6,nodejs8,nodejs14,nodejs10,nodejs4: The npm package "tar" (aka node-tar) has an arbitrary file creation/overwrite and arbitrary code execution vulnerability</issue>
<issue tracker="bnc" id="1190056">VUL-0: CVE-2021-37712: nodejs4,nodejs12,nodejs8,nodejs10,nodejs14,nodejs6: nodejs-tar - insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite</issue>
<issue tracker="bnc" id="1190057">VUL-0: CVE-2021-37701: nodejs4,nodejs12,nodejs8,nodejs10,nodejs14,nodejs6: nodejs-tar - insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite</issue>
<issue tracker="bnc" id="1191601">VUL-0: CVE-2021-22959: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: HTTP Request Smuggling due to spaced in headers</issue>
<issue tracker="bnc" id="1191602">VUL-0: CVE-2021-22960: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: HTTP Request Smuggling when parsing the body</issue>
<issue tracker="bnc" id="1194511">VUL-0: CVE-2021-44531: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: Improper handling of URI Subject Alternative Names</issue>
<issue tracker="bnc" id="1194512">VUL-0: CVE-2021-44532: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: Certificate Verification Bypass via String Injection</issue>
<issue tracker="bnc" id="1194513">VUL-0: CVE-2021-44533: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: Incorrect handling of certificate subject and issuer fields</issue>
<issue tracker="bnc" id="1194514">VUL-1: CVE-2022-21824: nodejs10,nodejs12,nodejs14,nodejs16,nodejs: Prototype pollution via console.table properties</issue>
<issue tracker="cve" id="2021-22959"/>
<issue tracker="cve" id="2021-22960"/>
<issue tracker="cve" id="2021-37701"/>
<issue tracker="cve" id="2021-37712"/>
<issue tracker="cve" id="2021-37713"/>
<issue tracker="cve" id="2021-39134"/>
<issue tracker="cve" id="2021-39135"/>
<issue tracker="cve" id="2021-44531"/>
<issue tracker="cve" id="2021-44532"/>
<issue tracker="cve" id="2021-44533"/>
<issue tracker="cve" id="2022-21824"/>
<packager>adamm</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for nodejs12</summary>
<description>This update for nodejs12 fixes the following issues:
- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).
- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).
- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).
- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).
- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers(bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190057).
- CVE-2021-37712: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190056).
- CVE-2021-37713: Fixed arbitrary file creation/overwrite and arbitrary code execution vulnerability in nodejs-tar (bsc#1190055).
- CVE-2021-39134: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190054).
- CVE-2021-39135: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190053).
</description>
</patchinfo>