An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1584 Final 1.0 1.0 2022-03-19 Initial 2022-03-19 2022-03-19 openEuler SA Tool V1.0 2022-03-19 nodejs-fstream security update An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3. Provides advanced file system stream objects for Node.js. These objects are like FS streams, but with stat on them, and support directories and symbolic links, as well as normal files. Also, you can use them to set the stats on a file, even if you don't change its contents, or to create a symlink, etc. Security Fix(es): fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.(CVE-2019-13173) An update for nodejs-fstream is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High nodejs-fstream https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1584 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-13173 https://nvd.nist.gov/vuln/detail/CVE-2019-13173 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 openEuler-20.03-LTS-SP3 nodejs-fstream-1.0.12-1.oe1.noarch.rpm nodejs-fstream-1.0.12-1.oe1.noarch.rpm nodejs-fstream-1.0.12-1.oe1.noarch.rpm nodejs-fstream-1.0.12-1.oe1.src.rpm nodejs-fstream-1.0.12-1.oe1.src.rpm nodejs-fstream-1.0.12-1.oe1.src.rpm fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable. 2022-03-19 CVE-2019-13173 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 openEuler-20.03-LTS-SP3 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N nodejs-fstream security update 2022-03-19 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1584