An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1584
Final
1.0
1.0
2022-03-19
Initial
2022-03-19
2022-03-19
openEuler SA Tool V1.0
2022-03-19
nodejs-fstream security update
An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
Provides advanced file system stream objects for Node.js. These objects are like FS streams, but with stat on them, and support directories and symbolic links, as well as normal files. Also, you can use them to set the stats on a file, even if you don't change its contents, or to create a symlink, etc.
Security Fix(es):
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.(CVE-2019-13173)
An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
nodejs-fstream
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1584
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-13173
https://nvd.nist.gov/vuln/detail/CVE-2019-13173
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
nodejs-fstream-1.0.12-1.oe1.noarch.rpm
nodejs-fstream-1.0.12-1.oe1.noarch.rpm
nodejs-fstream-1.0.12-1.oe1.noarch.rpm
nodejs-fstream-1.0.12-1.oe1.src.rpm
nodejs-fstream-1.0.12-1.oe1.src.rpm
nodejs-fstream-1.0.12-1.oe1.src.rpm
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
2022-03-19
CVE-2019-13173
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nodejs-fstream security update
2022-03-19
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1584