<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs20</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2574-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-22T10:35:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-22T10:35:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-22T10:35:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs20</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs20 fixes the following issues:

Update to 20.15.1:

- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)
- CVE-2024-22018: Fixed fs.lstat bypasses permission model (bsc#1227562)
- CVE-2024-36137: Fixed fs.fchown/fchmod bypasses permission model (bsc#1227561)
- CVE-2024-37372: Fixed Permission model improperly processes UNC paths (bsc#1227563)

Changes in 20.15.0:

- test_runner: support test plans
- inspector: introduce the --inspect-wait flag
- zlib: expose zlib.crc32()
- cli: allow running wasm in limited vmem with --disable-wasm-trap-handler

Changes in 20.14.0

- src,permission: throw async errors on async APIs
- test_runner: support forced exit

Changes in 20.13.1:

- buffer: improve base64 and base64url performance
- crypto: deprecate implicitly shortened GCM tags
- events,doc: mark CustomEvent as stable
- fs: add stacktrace to fs/promises
- report: add --report-exclude-network option
- src: add uv_get_available_memory to report and process
- stream: support typed arrays
- util: support array of formats in util.styleText
- v8: implement v8.queryObjects() for memory leak regression testing
- watch: mark as stable
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container bci/nodejs:latest-2024-2574,SUSE-2024-2574,SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2574,openSUSE-SLE-15.6-2024-2574</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      <Description>Link for SUSE-SU-2024:2574-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-July/036101.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2574-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227554</URL>
      <Description>SUSE Bug 1227554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227560</URL>
      <Description>SUSE Bug 1227560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227561</URL>
      <Description>SUSE Bug 1227561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227562</URL>
      <Description>SUSE Bug 1227562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227563</URL>
      <Description>SUSE Bug 1227563</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22018/</URL>
      <Description>SUSE CVE CVE-2024-22018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22020/</URL>
      <Description>SUSE CVE CVE-2024-22020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27980/</URL>
      <Description>SUSE CVE CVE-2024-27980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36137/</URL>
      <Description>SUSE CVE CVE-2024-36137 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36138/</URL>
      <Description>SUSE CVE CVE-2024-36138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-37372/</URL>
      <Description>SUSE CVE CVE-2024-37372 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container bci/nodejs:latest">
      <Branch Type="Product Name" Name="Container bci/nodejs:latest">
        <FullProductName ProductID="Container bci/nodejs:latest">Container bci/nodejs:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6" CPE="cpe:/o:suse:sle-module-web-scripting:15:sp6">SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-20.15.1-150600.3.3.2">
      <FullProductName ProductID="nodejs20-20.15.1-150600.3.3.2">nodejs20-20.15.1-150600.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm20-20.15.1-150600.3.3.2">
      <FullProductName ProductID="npm20-20.15.1-150600.3.3.2">npm20-20.15.1-150600.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="corepack20-20.15.1-150600.3.3.2">
      <FullProductName ProductID="corepack20-20.15.1-150600.3.3.2">corepack20-20.15.1-150600.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-devel-20.15.1-150600.3.3.2">
      <FullProductName ProductID="nodejs20-devel-20.15.1-150600.3.3.2">nodejs20-devel-20.15.1-150600.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-docs-20.15.1-150600.3.3.2">
      <FullProductName ProductID="nodejs20-docs-20.15.1-150600.3.3.2">nodejs20-docs-20.15.1-150600.3.3.2</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="Container bci/nodejs:latest">
      <FullProductName ProductID="Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2">nodejs20-20.15.1-150600.3.3.2 as a component of Container bci/nodejs:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="Container bci/nodejs:latest">
      <FullProductName ProductID="Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2">npm20-20.15.1-150600.3.3.2 as a component of Container bci/nodejs:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2">nodejs20-20.15.1-150600.3.3.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-devel-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2">nodejs20-devel-20.15.1-150600.3.3.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-docs-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2">nodejs20-docs-20.15.1-150600.3.3.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2">npm20-20.15.1-150600.3.3.2 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="corepack20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2">corepack20-20.15.1-150600.3.3.2 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2">nodejs20-20.15.1-150600.3.3.2 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-devel-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2">nodejs20-devel-20.15.1-150600.3.3.2 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-docs-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2">nodejs20-docs-20.15.1-150600.3.3.2 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.15.1-150600.3.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2">npm20-20.15.1-150600.3.3.2 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.
This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.</Note>
    </Notes>
    <CVE>CVE-2024-22018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22018.html</URL>
        <Description>CVE-2024-22018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227562</URL>
        <Description>SUSE Bug 1227562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security flaw in Node.js  allows a bypass of network import restrictions.
By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.
Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.
Exploiting this flaw can violate network import security, posing a risk to developers and servers.</Note>
    </Notes>
    <CVE>CVE-2024-22020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22020.html</URL>
        <Description>CVE-2024-22020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227554</URL>
        <Description>SUSE Bug 1227554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-27980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27980.html</URL>
        <Description>CVE-2024-27980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222665</URL>
        <Description>SUSE Bug 1222665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.

Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.</Note>
    </Notes>
    <CVE>CVE-2024-36137</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36137.html</URL>
        <Description>CVE-2024-36137</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227561</URL>
        <Description>SUSE Bug 1227561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.</Note>
    </Notes>
    <CVE>CVE-2024-36138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36138.html</URL>
        <Description>CVE-2024-36138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227560</URL>
        <Description>SUSE Bug 1227560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.</Note>
    </Notes>
    <CVE>CVE-2024-37372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.15.1-150600.3.3.2</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.15.1-150600.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242574-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-37372.html</URL>
        <Description>CVE-2024-37372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227563</URL>
        <Description>SUSE Bug 1227563</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
