{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs14":"14.18.3-15.24.1","nodejs14-devel":"14.18.3-15.24.1","nodejs14-docs":"14.18.3-15.24.1","npm14":"14.18.3-15.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 15 SP3","name":"nodejs14","purl":"pkg:rpm/suse/nodejs14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.18.3-15.24.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs14 fixes the following issues:\n\n- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).\n- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).\n- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).\n- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).\n","id":"SUSE-SU-2022:0112-1","modified":"2022-01-18T12:03:33Z","published":"2022-01-18T12:03:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220112-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194514"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21824"}],"related":["CVE-2021-44531","CVE-2021-44532","CVE-2021-44533","CVE-2022-21824"],"summary":"Security update for nodejs14","upstream":["CVE-2021-44531","CVE-2021-44532","CVE-2021-44533","CVE-2022-21824"]}