{"id":"RHSA-2017:0002","summary":"Red Hat Security Advisory: rh-nodejs4-nodejs and rh-nodejs4-http-parser security update","modified":"2026-03-13T10:30:11.002664Z","published":"2024-09-13T14:37:29Z","upstream":["CVE-2016-1669","CVE-2016-5180","CVE-2016-5325","CVE-2016-7099"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0002"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335449"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1346910"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1379921"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388097"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0002.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1669"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5180"},{"type":"ARTICLE","url":"https://c-ares.haxx.se/adv_20160929.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5325"},{"type":"ARTICLE","url":"https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7099"}],"affected":[{"package":{"name":"rh-nodejs4-http-parser","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-http-parser-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-http-parser-devel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-devel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-docs","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-http-parser","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-http-parser-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-http-parser-devel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-http-parser-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.0-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-devel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}},{"package":{"name":"rh-nodejs4-nodejs-docs","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-nodejs4-nodejs-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.2-4.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0002.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}