<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">nodejs14-14.17.5-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11096-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">nodejs14-14.17.5-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the nodejs14-14.17.5-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11096</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11080/</URL>
      <Description>SUSE CVE CVE-2020-11080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15095/</URL>
      <Description>SUSE CVE CVE-2020-15095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7774/</URL>
      <Description>SUSE CVE CVE-2020-7774 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8172/</URL>
      <Description>SUSE CVE CVE-2020-8172 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8174/</URL>
      <Description>SUSE CVE CVE-2020-8174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8201/</URL>
      <Description>SUSE CVE CVE-2020-8201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8251/</URL>
      <Description>SUSE CVE CVE-2020-8251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8265/</URL>
      <Description>SUSE CVE CVE-2020-8265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8277/</URL>
      <Description>SUSE CVE CVE-2020-8277 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8287/</URL>
      <Description>SUSE CVE CVE-2020-8287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21148/</URL>
      <Description>SUSE CVE CVE-2021-21148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22883/</URL>
      <Description>SUSE CVE CVE-2021-22883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22884/</URL>
      <Description>SUSE CVE CVE-2021-22884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22918/</URL>
      <Description>SUSE CVE CVE-2021-22918 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22930/</URL>
      <Description>SUSE CVE CVE-2021-22930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22939/</URL>
      <Description>SUSE CVE CVE-2021-22939 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22940/</URL>
      <Description>SUSE CVE CVE-2021-22940 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27290/</URL>
      <Description>SUSE CVE CVE-2021-27290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3672/</URL>
      <Description>SUSE CVE CVE-2021-3672 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs14-14.17.5-1.2">
      <FullProductName ProductID="nodejs14-14.17.5-1.2">nodejs14-14.17.5-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs14-devel-14.17.5-1.2">
      <FullProductName ProductID="nodejs14-devel-14.17.5-1.2">nodejs14-devel-14.17.5-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs14-docs-14.17.5-1.2">
      <FullProductName ProductID="nodejs14-docs-14.17.5-1.2">nodejs14-docs-14.17.5-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm14-14.17.5-1.2">
      <FullProductName ProductID="npm14-14.17.5-1.2">npm14-14.17.5-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs14-14.17.5-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs14-14.17.5-1.2">nodejs14-14.17.5-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs14-devel-14.17.5-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2">nodejs14-devel-14.17.5-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs14-docs-14.17.5-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2">nodejs14-docs-14.17.5-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm14-14.17.5-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:npm14-14.17.5-1.2">npm14-14.17.5-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.</Note>
    </Notes>
    <CVE>CVE-2020-11080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11080.html</URL>
        <Description>CVE-2020-11080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172441</URL>
        <Description>SUSE Bug 1172441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172442</URL>
        <Description>SUSE Bug 1172442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181358</URL>
        <Description>SUSE Bug 1181358</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "&lt;protocol&gt;://[&lt;user&gt;[:&lt;password&gt;]@]&lt;hostname&gt;[:&lt;port&gt;][:][/]&lt;path&gt;". The password value is not redacted and is printed to stdout and also to any generated log files.</Note>
    </Notes>
    <CVE>CVE-2020-15095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15095.html</URL>
        <Description>CVE-2020-15095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173937</URL>
        <Description>SUSE Bug 1173937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.</Note>
    </Notes>
    <CVE>CVE-2020-7774</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7774.html</URL>
        <Description>CVE-2020-7774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184450</URL>
        <Description>SUSE Bug 1184450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TLS session reuse can lead to host certificate verification bypass in node version &lt; 12.18.0 and &lt; 14.4.0.</Note>
    </Notes>
    <CVE>CVE-2020-8172</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8172.html</URL>
        <Description>CVE-2020-8172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172441</URL>
        <Description>SUSE Bug 1172441</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">napi_get_value_string_*() allows various kinds of memory corruption in node &lt; 10.21.0, 12.18.0, and &lt; 14.4.0.</Note>
    </Notes>
    <CVE>CVE-2020-8174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8174.html</URL>
        <Description>CVE-2020-8174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172443</URL>
        <Description>SUSE Bug 1172443</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js &lt; 12.18.4 and &lt; 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.</Note>
    </Notes>
    <CVE>CVE-2020-8201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8201.html</URL>
        <Description>CVE-2020-8201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176605</URL>
        <Description>SUSE Bug 1176605</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js &lt; 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.</Note>
    </Notes>
    <CVE>CVE-2020-8251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8251.html</URL>
        <Description>CVE-2020-8251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176604</URL>
        <Description>SUSE Bug 1176604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.</Note>
    </Notes>
    <CVE>CVE-2020-8265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8265.html</URL>
        <Description>CVE-2020-8265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180553</URL>
        <Description>SUSE Bug 1180553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions &lt; 15.2.1, &lt; 14.15.1, and &lt; 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.</Note>
    </Notes>
    <CVE>CVE-2020-8277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8277.html</URL>
        <Description>CVE-2020-8277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178882</URL>
        <Description>SUSE Bug 1178882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.</Note>
    </Notes>
    <CVE>CVE-2020-8287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8287.html</URL>
        <Description>CVE-2020-8287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180554</URL>
        <Description>SUSE Bug 1180554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-21148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21148.html</URL>
        <Description>CVE-2021-21148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181827</URL>
        <Description>SUSE Bug 1181827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.</Note>
    </Notes>
    <CVE>CVE-2021-22883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22883.html</URL>
        <Description>CVE-2021-22883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182619</URL>
        <Description>SUSE Bug 1182619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes "localhost6". When "localhost6" is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the "localhost6" domain. As long as the attacker uses the "localhost6" domain, they can still apply the attack described in CVE-2018-7160.</Note>
    </Notes>
    <CVE>CVE-2021-22884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22884.html</URL>
        <Description>CVE-2021-22884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182620</URL>
        <Description>SUSE Bug 1182620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188549</URL>
        <Description>SUSE Bug 1188549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201328</URL>
        <Description>SUSE Bug 1201328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().</Note>
    </Notes>
    <CVE>CVE-2021-22918</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22918.html</URL>
        <Description>CVE-2021-22918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187973</URL>
        <Description>SUSE Bug 1187973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.</Note>
    </Notes>
    <CVE>CVE-2021-22930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22930.html</URL>
        <Description>CVE-2021-22930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188917</URL>
        <Description>SUSE Bug 1188917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189368</URL>
        <Description>SUSE Bug 1189368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.</Note>
    </Notes>
    <CVE>CVE-2021-22939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22939.html</URL>
        <Description>CVE-2021-22939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189369</URL>
        <Description>SUSE Bug 1189369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.</Note>
    </Notes>
    <CVE>CVE-2021-22940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22940.html</URL>
        <Description>CVE-2021-22940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189368</URL>
        <Description>SUSE Bug 1189368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.</Note>
    </Notes>
    <CVE>CVE-2021-27290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27290.html</URL>
        <Description>CVE-2021-27290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187976</URL>
        <Description>SUSE Bug 1187976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nodejs14-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-devel-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs14-docs-14.17.5-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:npm14-14.17.5-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3672.html</URL>
        <Description>CVE-2021-3672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188881</URL>
        <Description>SUSE Bug 1188881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193099</URL>
        <Description>SUSE Bug 1193099</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
