{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs12":"12.18.4-4.6.1","nodejs12-devel":"12.18.4-4.6.1","nodejs12-docs":"12.18.4-4.6.1","npm12":"12.18.4-4.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 15 SP2","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.18.4-4.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs12 fixes the following issues:\n\n- nodejs12 was updated to 12.18.4 LTS:\n   - CVE-2020-8201: Fixed an HTTP Request Smuggling due to CR-to-Hyphen conversion (bsc#1176605).\n   - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589).\n   - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937).\n- Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation\n  on Aarch64 with gcc10 (bsc#1172686)\n","id":"SUSE-SU-2020:2813-1","modified":"2020-10-01T07:55:11Z","published":"2020-10-01T07:55:11Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202813-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176589"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8252"}],"related":["CVE-2020-15095","CVE-2020-8201","CVE-2020-8252"],"summary":"Security update for nodejs12","upstream":["CVE-2020-15095","CVE-2020-8201","CVE-2020-8252"]}