<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs18</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2496-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-16T07:33:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-16T07:33:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-16T07:33:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs18</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs18 fixes the following issues:

Update to 18.20.4:

- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)

Changes in 18.20.3:

- This release fixes a regression introduced in Node.js 18.19.0 where http.server.close() was incorrectly closing idle connections.
  deps:
  - acorn updated to 8.11.3.
  - acorn-walk updated to 8.3.2.
  - ada updated to 2.7.8.
  - c-ares updated to 1.28.1.
  - corepack updated to 0.28.0.
  - nghttp2 updated to 1.61.0.
  - ngtcp2 updated to 1.3.0.
  - npm updated to 10.7.0. Includes a fix from npm@10.5.1 to limit the number of open connections npm/cli#7324.
  - simdutf updated to 5.2.4.

Changes in 18.20.2:

- CVE-2024-27980: Fixed command injection via args parameter of child_process.spawn without shell option enabled on Windows (bsc#1222665)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-2496,SUSE-SLE-Module-Web-Scripting-12-2024-2496</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242496-1/</URL>
      <Description>Link for SUSE-SU-2024:2496-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-July/018981.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2496-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222665</URL>
      <Description>SUSE Bug 1222665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227554</URL>
      <Description>SUSE Bug 1227554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227560</URL>
      <Description>SUSE Bug 1227560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22020/</URL>
      <Description>SUSE CVE CVE-2024-22020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27980/</URL>
      <Description>SUSE CVE CVE-2024-27980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36138/</URL>
      <Description>SUSE CVE CVE-2024-36138 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Web and Scripting 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Web and Scripting 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 12" CPE="cpe:/o:suse:sle-module-web-scripting:12">SUSE Linux Enterprise Module for Web and Scripting 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="corepack18-18.20.4-8.24.1">
      <FullProductName ProductID="corepack18-18.20.4-8.24.1">corepack18-18.20.4-8.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-18.20.4-8.24.1">
      <FullProductName ProductID="nodejs18-18.20.4-8.24.1">nodejs18-18.20.4-8.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-devel-18.20.4-8.24.1">
      <FullProductName ProductID="nodejs18-devel-18.20.4-8.24.1">nodejs18-devel-18.20.4-8.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-docs-18.20.4-8.24.1">
      <FullProductName ProductID="nodejs18-docs-18.20.4-8.24.1">nodejs18-docs-18.20.4-8.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm18-18.20.4-8.24.1">
      <FullProductName ProductID="npm18-18.20.4-8.24.1">npm18-18.20.4-8.24.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs18-18.20.4-8.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-18.20.4-8.24.1">nodejs18-18.20.4-8.24.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-devel-18.20.4-8.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-devel-18.20.4-8.24.1">nodejs18-devel-18.20.4-8.24.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-docs-18.20.4-8.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-docs-18.20.4-8.24.1">nodejs18-docs-18.20.4-8.24.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm18-18.20.4-8.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 12:npm18-18.20.4-8.24.1">npm18-18.20.4-8.24.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw in Node.js  allows a bypass of network import restrictions.
By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.
Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.
Exploiting this flaw can violate network import security, posing a risk to developers and servers.</Note>
    </Notes>
    <CVE>CVE-2024-22020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-devel-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-docs-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:npm18-18.20.4-8.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242496-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22020.html</URL>
        <Description>CVE-2024-22020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227554</URL>
        <Description>SUSE Bug 1227554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-27980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-devel-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-docs-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:npm18-18.20.4-8.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242496-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27980.html</URL>
        <Description>CVE-2024-27980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222665</URL>
        <Description>SUSE Bug 1222665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-36138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-devel-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:nodejs18-docs-18.20.4-8.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 12:npm18-18.20.4-8.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242496-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36138.html</URL>
        <Description>CVE-2024-36138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
