{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"nodejs-fstream security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for nodejs-fstream is now available for openEuler-22.03-LTS.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Provides advanced file system stream objects for Node.js.  These objects are like FS streams, but with stat on them, and support directories and symbolic links, as well as normal files.  Also, you can use them to set the stats on a file, even if you don't change its contents, or to create a symlink, etc.\n\nSecurity Fix(es):\n\nfstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.(CVE-2019-13173)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for nodejs-fstream is now available for openEuler-22.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"nodejs-fstream",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2022-2084",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2084"
			},
			{
				"summary":"CVE-2019-13173",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2019-13173&packageName=nodejs-fstream"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13173"
			},
			{
				"summary":"openEuler-SA-2022-2084 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2022/csaf-openeuler-sa-2022-2084.json"
			}
		],
		"title":"An update for nodejs-fstream is now available for openEuler-22.03-LTS",
		"tracking":{
			"initial_release_date":"2022-11-11T09:49:29+08:00",
			"revision_history":[
				{
					"date":"2022-11-11T09:49:29+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:49:29+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:49:29+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:49:29+08:00",
			"id":"openEuler-SA-2022-2084",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"openEuler-22.03-LTS",
									"name":"openEuler-22.03-LTS"
								},
								"name":"openEuler-22.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"nodejs-fstream-1.0.12-1.oe2203.noarch.rpm",
									"name":"nodejs-fstream-1.0.12-1.oe2203.noarch.rpm"
								},
								"name":"nodejs-fstream-1.0.12-1.oe2203.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"nodejs-fstream-1.0.12-1.oe2203.src.rpm",
									"name":"nodejs-fstream-1.0.12-1.oe2203.src.rpm"
								},
								"name":"nodejs-fstream-1.0.12-1.oe2203.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"nodejs-fstream-1.0.12-1.oe2203.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.noarch",
					"name":"nodejs-fstream-1.0.12-1.oe2203.noarch as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"nodejs-fstream-1.0.12-1.oe2203.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.src",
					"name":"nodejs-fstream-1.0.12-1.oe2203.src as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2019-13173",
			"notes":[
				{
					"text":"fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.noarch",
					"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.noarch",
						"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.src"
					],
					"details":"nodejs-fstream security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2084"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.noarch",
						"openEuler-22.03-LTS:nodejs-fstream-1.0.12-1.oe2203.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2019-13173"
		}
	]
}