{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs10":"10.24.1-1.46.1","nodejs10-devel":"10.24.1-1.46.1","nodejs10-docs":"10.24.1-1.46.1","npm10":"10.24.1-1.46.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"nodejs10","purl":"pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"10.24.1-1.46.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs10 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).                                                                                                                                                 \n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).                                                                                                           \n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).                                                                                                   \n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n- CVE-2022-21824: Fixed prototype pollution via console.table (bsc#1194514).\n","id":"SUSE-SU-2022:0570-1","modified":"2022-02-24T09:35:40Z","published":"2022-02-24T09:35:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220570-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192696"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194514"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-23343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21824"}],"related":["CVE-2021-23343","CVE-2021-32803","CVE-2021-32804","CVE-2021-3807","CVE-2021-3918","CVE-2022-21824"],"summary":"Security update for nodejs10","upstream":["CVE-2021-23343","CVE-2021-32803","CVE-2021-32804","CVE-2021-3807","CVE-2021-3918","CVE-2022-21824"]}