{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.9-4.25.1","nodejs12-devel":"12.22.9-4.25.1","nodejs12-docs":"12.22.9-4.25.1","npm12":"12.22.9-4.25.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 15 SP3","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.9-4.25.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs12 fixes the following issues:\n\n- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).\n- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).\n- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).\n- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).\n","id":"SUSE-SU-2022:0113-1","modified":"2022-01-18T12:03:48Z","published":"2022-01-18T12:03:48Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220113-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194514"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21824"}],"related":["CVE-2021-44531","CVE-2021-44532","CVE-2021-44533","CVE-2022-21824"],"summary":"Security update for nodejs12","upstream":["CVE-2021-44531","CVE-2021-44532","CVE-2021-44533","CVE-2022-21824"]}