<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">corepack20-20.5.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13117-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">corepack20-20.5.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the corepack20-20.5.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13117</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32002/</URL>
      <Description>SUSE CVE CVE-2023-32002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32003/</URL>
      <Description>SUSE CVE CVE-2023-32003 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32004/</URL>
      <Description>SUSE CVE CVE-2023-32004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32005/</URL>
      <Description>SUSE CVE CVE-2023-32005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32006/</URL>
      <Description>SUSE CVE CVE-2023-32006 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32558/</URL>
      <Description>SUSE CVE CVE-2023-32558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32559/</URL>
      <Description>SUSE CVE CVE-2023-32559 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="corepack20-20.5.1-1.1">
      <FullProductName ProductID="corepack20-20.5.1-1.1">corepack20-20.5.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-20.5.1-1.1">
      <FullProductName ProductID="nodejs20-20.5.1-1.1">nodejs20-20.5.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-devel-20.5.1-1.1">
      <FullProductName ProductID="nodejs20-devel-20.5.1-1.1">nodejs20-devel-20.5.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-docs-20.5.1-1.1">
      <FullProductName ProductID="nodejs20-docs-20.5.1-1.1">nodejs20-docs-20.5.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm20-20.5.1-1.1">
      <FullProductName ProductID="npm20-20.5.1-1.1">npm20-20.5.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="corepack20-20.5.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:corepack20-20.5.1-1.1">corepack20-20.5.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-20.5.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs20-20.5.1-1.1">nodejs20-20.5.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-devel-20.5.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1">nodejs20-devel-20.5.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-docs-20.5.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1">nodejs20-docs-20.5.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.5.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:npm20-20.5.1-1.1">npm20-20.5.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32002.html</URL>
        <Description>CVE-2023-32002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214150</URL>
        <Description>SUSE Bug 1214150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.

This vulnerability affects all users using the experimental permission model in Node.js 20.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32003.html</URL>
        <Description>CVE-2023-32003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214151</URL>
        <Description>SUSE Bug 1214151</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions.

This vulnerability affects all users using the experimental permission model in Node.js 20.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32004.html</URL>
        <Description>CVE-2023-32004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214152</URL>
        <Description>SUSE Bug 1214152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216271</URL>
        <Description>SUSE Bug 1216271</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument.

This flaw arises from an inadequate permission model that fails to restrict file stats through the `fs.statfs` API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.

This vulnerability affects all users using the experimental permission model in Node.js 20.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32005.html</URL>
        <Description>CVE-2023-32005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214153</URL>
        <Description>SUSE Bug 1214153</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32006.html</URL>
        <Description>CVE-2023-32006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214156</URL>
        <Description>SUSE Bug 1214156</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. 

This vulnerability affects all users using the experimental permission model in Node.js 20.x.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32558.html</URL>
        <Description>CVE-2023-32558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214155</URL>
        <Description>SUSE Bug 1214155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2023-32559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-devel-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs20-docs-20.5.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm20-20.5.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32559.html</URL>
        <Description>CVE-2023-32559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214154</URL>
        <Description>SUSE Bug 1214154</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
