{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2018-3750","title":"Title"},{"category":"description","text":"The utilities function in all versions <= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2018-3750","url":"https://www.suse.com/security/cve/CVE-2018-3750"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2018-3750","tracking":{"current_release_date":"2026-01-16T01:08:38Z","generator":{"date":"2026-01-16T01:08:38Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2018-3750","initial_release_date":"2026-01-16T01:08:38Z","revision_history":[{"date":"2026-01-16T01:08:38Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to critical"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 8","product":{"name":"SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8","product_identification_helper":{"cpe":"cpe:/o:suse:sll:8"}}},{"category":"product_version","name":"nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","product":{"name":"nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","product_id":"nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","product_identification_helper":{"cpe":"cpe:2.3:a:nodejs:node.js:12.20.1:*:*:*:-:*:*:*","purl":"pkg:rpm/suse/nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c@"}}},{"category":"product_version","name":"nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","product":{"name":"nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","product_id":"nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c@"}}},{"category":"product_version","name":"nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","product":{"name":"nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","product_id":"nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c@"}}},{"category":"product_version","name":"nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","product":{"name":"nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","product_id":"nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c@"}}},{"category":"product_version","name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","product":{"name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","product_id":"nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f@"}}},{"category":"product_version","name":"nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","product":{"name":"nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","product_id":"nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45@"}}},{"category":"product_version","name":"npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c","product":{"name":"npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c","product_id":"npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c","product_identification_helper":{"purl":"pkg:rpm/suse/npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c@"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c"},"product_reference":"nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c"},"product_reference":"nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c"},"product_reference":"nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c"},"product_reference":"nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f"},"product_reference":"nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45"},"product_reference":"nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c"},"product_reference":"npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c","relates_to_product_reference":"SUSE Liberty Linux 8"}]},"vulnerabilities":[{"cve":"CVE-2018-3750","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-3750"}],"notes":[{"category":"general","text":"The utilities function in all versions <= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 8:nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","SUSE Liberty Linux 8:nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","SUSE Liberty Linux 8:npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c"]},"references":[{"category":"external","summary":"CVE-2018-3750","url":"https://www.suse.com/security/cve/CVE-2018-3750"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 8:nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","SUSE Liberty Linux 8:nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","SUSE Liberty Linux 8:npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Liberty Linux 8:nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f","SUSE Liberty Linux 8:nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45","SUSE Liberty Linux 8:npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c"]}],"threats":[{"category":"impact","date":"2018-05-15T06:25:06Z","details":"critical"}],"title":"CVE-2018-3750"}]}