<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">corepack21-21.6.2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13698-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">corepack21-21.6.2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the corepack21-21.6.2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13698</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-46809/</URL>
      <Description>SUSE CVE CVE-2023-46809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21890/</URL>
      <Description>SUSE CVE CVE-2024-21890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21891/</URL>
      <Description>SUSE CVE CVE-2024-21891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21892/</URL>
      <Description>SUSE CVE CVE-2024-21892 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21896/</URL>
      <Description>SUSE CVE CVE-2024-21896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22017/</URL>
      <Description>SUSE CVE CVE-2024-22017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22019/</URL>
      <Description>SUSE CVE CVE-2024-22019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22025/</URL>
      <Description>SUSE CVE CVE-2024-22025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-24758/</URL>
      <Description>SUSE CVE CVE-2024-24758 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="corepack21-21.6.2-1.1">
      <FullProductName ProductID="corepack21-21.6.2-1.1">corepack21-21.6.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs21-21.6.2-1.1">
      <FullProductName ProductID="nodejs21-21.6.2-1.1">nodejs21-21.6.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs21-devel-21.6.2-1.1">
      <FullProductName ProductID="nodejs21-devel-21.6.2-1.1">nodejs21-devel-21.6.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs21-docs-21.6.2-1.1">
      <FullProductName ProductID="nodejs21-docs-21.6.2-1.1">nodejs21-docs-21.6.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm21-21.6.2-1.1">
      <FullProductName ProductID="npm21-21.6.2-1.1">npm21-21.6.2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="corepack21-21.6.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:corepack21-21.6.2-1.1">corepack21-21.6.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs21-21.6.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs21-21.6.2-1.1">nodejs21-21.6.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs21-devel-21.6.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1">nodejs21-devel-21.6.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs21-docs-21.6.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1">nodejs21-docs-21.6.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm21-21.6.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:npm21-21.6.2-1.1">npm21-21.6.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.</Note>
    </Notes>
    <CVE>CVE-2023-46809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-46809.html</URL>
        <Description>CVE-2023-46809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219997</URL>
        <Description>SUSE Bug 1219997</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:
```
 --allow-fs-read=/home/node/.ssh/*.pub
```

will ignore `pub` and give access to everything after `.ssh/`.

This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2024-21890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21890.html</URL>
        <Description>CVE-2024-21890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219999</URL>
        <Description>SUSE Bug 1219999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2024-21891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21891.html</URL>
        <Description>CVE-2024-21891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219998</URL>
        <Description>SUSE Bug 1219998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.
Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.
This allows unprivileged users to inject code that inherits the process's elevated privileges.</Note>
    </Notes>
    <CVE>CVE-2024-21892</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21892.html</URL>
        <Description>CVE-2024-21892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219992</URL>
        <Description>SUSE Bug 1219992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2024-21896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21896.html</URL>
        <Description>CVE-2024-21896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219994</URL>
        <Description>SUSE Bug 1219994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().
This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().
This vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.</Note>
    </Notes>
    <CVE>CVE-2024-22017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22017.html</URL>
        <Description>CVE-2024-22017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219995</URL>
        <Description>SUSE Bug 1219995</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.</Note>
    </Notes>
    <CVE>CVE-2024-22019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22019.html</URL>
        <Description>CVE-2024-22019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219993</URL>
        <Description>SUSE Bug 1219993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.
The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.
An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.</Note>
    </Notes>
    <CVE>CVE-2024-22025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22025.html</URL>
        <Description>CVE-2024-22025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220014</URL>
        <Description>SUSE Bug 1220014</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2024-24758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:corepack21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-devel-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:nodejs21-docs-21.6.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:npm21-21.6.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-24758.html</URL>
        <Description>CVE-2024-24758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220017</URL>
        <Description>SUSE Bug 1220017</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
