{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2022-32212: fix IPv4 validation in inspector_socket to properly validate\n  IP addresses and reject non-routable IPs (0.0.0.0/8), replace vulnerable\n  dot-counting parser with proper octet validation, add tests",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_nodejs/el9/advisories/2025/clsa-2025_1764713429.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1764713429",
        "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1764713429"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-02T22:11:09Z",
      "generator": {
        "date": "2025-12-02T22:11:09Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1764713429",
      "initial_release_date": "2025-12-02T22:11:09Z",
      "revision_history": [
        {
          "date": "2025-12-02T22:11:09Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "alt-nodejs12-nodejs: Fix of CVE-2022-32212"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 9",
                "product": {
                  "name": "Community Enterprise Operating System 9",
                  "product_id": "CentOS-9",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:9:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Cloud Linux Software, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
                "product": {
                  "name": "alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
                  "product_id": "alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs12-nodejs@12.22.12-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
                "product": {
                  "name": "alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
                  "product_id": "alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs12-nodejs-devel@12.22.12-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs12-npm-0:12.22.12-7.el9.x86_64",
                "product": {
                  "name": "alt-nodejs12-npm-0:12.22.12-7.el9.x86_64",
                  "product_id": "alt-nodejs12-npm-0:12.22.12-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs12-npm@12.22.12-7.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
                "product": {
                  "name": "alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
                  "product_id": "alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs12-nodejs-docs@12.22.12-7.el9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-9:alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64"
        },
        "product_reference": "alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
        "relates_to_product_reference": "CentOS-9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-9:alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch"
        },
        "product_reference": "alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
        "relates_to_product_reference": "CentOS-9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-9:alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64"
        },
        "product_reference": "alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
        "relates_to_product_reference": "CentOS-9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs12-npm-0:12.22.12-7.el9.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-9:alt-nodejs12-npm-0:12.22.12-7.el9.x86_64"
        },
        "product_reference": "alt-nodejs12-npm-0:12.22.12-7.el9.x86_64",
        "relates_to_product_reference": "CentOS-9"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-32212",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "description",
          "text": "A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-9:alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
          "CentOS-9:alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
          "CentOS-9:alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
          "CentOS-9:alt-nodejs12-npm-0:12.22.12-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-nodejs/cve/CVE-2022-32212"
        },
        {
          "category": "external",
          "summary": "https://hackerone.com/reports/1632921",
          "url": "https://hackerone.com/reports/1632921"
        }
      ],
      "release_date": "2022-07-14T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-02T22:10:32.068464Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1764713429",
          "product_ids": [
            "CentOS-9:alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
            "CentOS-9:alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
            "CentOS-9:alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
            "CentOS-9:alt-nodejs12-npm-0:12.22.12-7.el9.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1764713429"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-9:alt-nodejs12-nodejs-0:12.22.12-7.el9.x86_64",
            "CentOS-9:alt-nodejs12-nodejs-devel-0:12.22.12-7.el9.x86_64",
            "CentOS-9:alt-nodejs12-nodejs-docs-0:12.22.12-7.el9.noarch",
            "CentOS-9:alt-nodejs12-npm-0:12.22.12-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}