Resource Exhaustion Affecting nodejs-full-i18n package, versions <1:16.16.0-1.el9_0
Threat Intelligence
EPSS
1.24% (86th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-NODEJSFULLI18N-3547870
- published 26 Jul 2021
- disclosed 12 Jan 2021
Introduced: 12 Jan 2021
CVE-2020-28469 Open this link in a new tabHow to fix?
Upgrade RHEL:9 nodejs-full-i18n to version 1:16.16.0-1.el9_0 or higher.
This issue was patched in RHSA-2022:6595.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nodejs-full-i18n package and not the nodejs-full-i18n package as distributed by RHEL.
See How to fix? for RHEL:9 relevant fixed versions and status.
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
References
- https://access.redhat.com/security/cve/CVE-2020-28469
- https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9
- https://github.com/gulpjs/glob-parent/pull/36
- https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
- https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
- https://access.redhat.com/errata/RHSA-2022:6595
- https://www.oracle.com/security-alerts/cpujan2022.html
CVSS Scores
version 3.1