<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs18</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2542-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-17T07:51:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-17T07:51:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-17T07:51:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs18</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs18 fixes the following issues:

Update to 18.20.4:

- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)

Changes in 18.20.3:

- This release fixes a regression introduced in Node.js 18.19.0 where http.server.close() was incorrectly closing idle connections.
  deps:
  - acorn updated to 8.11.3.
  - acorn-walk updated to 8.3.2.
  - ada updated to 2.7.8.
  - c-ares updated to 1.28.1.
  - corepack updated to 0.28.0.
  - nghttp2 updated to 1.61.0.
  - ngtcp2 updated to 1.3.0.
  - npm updated to 10.7.0. Includes a fix from npm@10.5.1 to limit the number of open connections npm/cli#7324.
  - simdutf updated to 5.2.4.

Changes in 18.20.2:

- CVE-2024-27980: Fixed command injection via args parameter of child_process.spawn without shell option enabled on Windows (bsc#1222665)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container bci/node:18-2024-2542,SUSE-2024-2542,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2542,openSUSE-SLE-15.5-2024-2542</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242542-1/</URL>
      <Description>Link for SUSE-SU-2024:2542-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-July/018991.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2542-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222665</URL>
      <Description>SUSE Bug 1222665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227554</URL>
      <Description>SUSE Bug 1227554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227560</URL>
      <Description>SUSE Bug 1227560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22020/</URL>
      <Description>SUSE CVE CVE-2024-22020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27980/</URL>
      <Description>SUSE CVE CVE-2024-27980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36138/</URL>
      <Description>SUSE CVE CVE-2024-36138 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container bci/node:18">
      <Branch Type="Product Name" Name="Container bci/node:18">
        <FullProductName ProductID="Container bci/node:18">Container bci/node:18</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP5" CPE="cpe:/o:suse:sle-module-web-scripting:15:sp5">SUSE Linux Enterprise Module for Web and Scripting 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-18.20.4-150400.9.24.2">
      <FullProductName ProductID="nodejs18-18.20.4-150400.9.24.2">nodejs18-18.20.4-150400.9.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm18-18.20.4-150400.9.24.2">
      <FullProductName ProductID="npm18-18.20.4-150400.9.24.2">npm18-18.20.4-150400.9.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="corepack18-18.20.4-150400.9.24.2">
      <FullProductName ProductID="corepack18-18.20.4-150400.9.24.2">corepack18-18.20.4-150400.9.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-devel-18.20.4-150400.9.24.2">
      <FullProductName ProductID="nodejs18-devel-18.20.4-150400.9.24.2">nodejs18-devel-18.20.4-150400.9.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs18-docs-18.20.4-150400.9.24.2">
      <FullProductName ProductID="nodejs18-docs-18.20.4-150400.9.24.2">nodejs18-docs-18.20.4-150400.9.24.2</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="Container bci/node:18">
      <FullProductName ProductID="Container bci/node:18:nodejs18-18.20.4-150400.9.24.2">nodejs18-18.20.4-150400.9.24.2 as a component of Container bci/node:18</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="Container bci/node:18">
      <FullProductName ProductID="Container bci/node:18:npm18-18.20.4-150400.9.24.2">npm18-18.20.4-150400.9.24.2 as a component of Container bci/node:18</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-18.20.4-150400.9.24.2">nodejs18-18.20.4-150400.9.24.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-devel-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-devel-18.20.4-150400.9.24.2">nodejs18-devel-18.20.4-150400.9.24.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-docs-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-docs-18.20.4-150400.9.24.2">nodejs18-docs-18.20.4-150400.9.24.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP5:npm18-18.20.4-150400.9.24.2">npm18-18.20.4-150400.9.24.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="corepack18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:corepack18-18.20.4-150400.9.24.2">corepack18-18.20.4-150400.9.24.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nodejs18-18.20.4-150400.9.24.2">nodejs18-18.20.4-150400.9.24.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-devel-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nodejs18-devel-18.20.4-150400.9.24.2">nodejs18-devel-18.20.4-150400.9.24.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs18-docs-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nodejs18-docs-18.20.4-150400.9.24.2">nodejs18-docs-18.20.4-150400.9.24.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm18-18.20.4-150400.9.24.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:npm18-18.20.4-150400.9.24.2">npm18-18.20.4-150400.9.24.2 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw in Node.js  allows a bypass of network import restrictions.
By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.
Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.
Exploiting this flaw can violate network import security, posing a risk to developers and servers.</Note>
    </Notes>
    <CVE>CVE-2024-22020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/node:18:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>Container bci/node:18:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:corepack18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:npm18-18.20.4-150400.9.24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242542-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22020.html</URL>
        <Description>CVE-2024-22020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227554</URL>
        <Description>SUSE Bug 1227554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-27980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/node:18:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>Container bci/node:18:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:corepack18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:npm18-18.20.4-150400.9.24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242542-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27980.html</URL>
        <Description>CVE-2024-27980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222665</URL>
        <Description>SUSE Bug 1222665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-36138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/node:18:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>Container bci/node:18:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP5:npm18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:corepack18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-devel-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:nodejs18-docs-18.20.4-150400.9.24.2</ProductID>
        <ProductID>openSUSE Leap 15.5:npm18-18.20.4-150400.9.24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242542-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36138.html</URL>
        <Description>CVE-2024-36138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
