<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs20</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02045-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-06-20T11:04:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-06-20T11:04:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-06-20T11:04:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs20</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs20 fixes the following issues:

Update to 20.19.2:

- CVE-2025-23166: improper error handling in async cryptographic operations crashes process (bsc#1243218).
- CVE-2025-23167: improper HTTP header block termination in llhttp (bsc#1243220).
- CVE-2025-23165: add missing call to uv_fs_req_cleanup (bsc#1243217).

Other bugfixes:

- Build with PIE (bsc#1239949)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-2045,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2045,openSUSE-SLE-15.6-2025-2045</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502045-1/</URL>
      <Description>Link for SUSE-SU-2025:02045-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-June/040401.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02045-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239949</URL>
      <Description>SUSE Bug 1239949</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243217</URL>
      <Description>SUSE Bug 1243217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243218</URL>
      <Description>SUSE Bug 1243218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243220</URL>
      <Description>SUSE Bug 1243220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23165/</URL>
      <Description>SUSE CVE CVE-2025-23165 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23166/</URL>
      <Description>SUSE CVE CVE-2025-23166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23167/</URL>
      <Description>SUSE CVE CVE-2025-23167 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6" CPE="cpe:/o:suse:sle-module-web-scripting:15:sp6">SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="corepack20-20.19.2-150600.3.12.1">
      <FullProductName ProductID="corepack20-20.19.2-150600.3.12.1">corepack20-20.19.2-150600.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-20.19.2-150600.3.12.1">
      <FullProductName ProductID="nodejs20-20.19.2-150600.3.12.1">nodejs20-20.19.2-150600.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-devel-20.19.2-150600.3.12.1">
      <FullProductName ProductID="nodejs20-devel-20.19.2-150600.3.12.1">nodejs20-devel-20.19.2-150600.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs20-docs-20.19.2-150600.3.12.1">
      <FullProductName ProductID="nodejs20-docs-20.19.2-150600.3.12.1">nodejs20-docs-20.19.2-150600.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm20-20.19.2-150600.3.12.1">
      <FullProductName ProductID="npm20-20.19.2-150600.3.12.1">npm20-20.19.2-150600.3.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs20-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.19.2-150600.3.12.1">nodejs20-20.19.2-150600.3.12.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-devel-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.19.2-150600.3.12.1">nodejs20-devel-20.19.2-150600.3.12.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-docs-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.19.2-150600.3.12.1">nodejs20-docs-20.19.2-150600.3.12.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Web and Scripting 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.19.2-150600.3.12.1">npm20-20.19.2-150600.3.12.1 as a component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="corepack20-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:corepack20-20.19.2-150600.3.12.1">corepack20-20.19.2-150600.3.12.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-20.19.2-150600.3.12.1">nodejs20-20.19.2-150600.3.12.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-devel-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-devel-20.19.2-150600.3.12.1">nodejs20-devel-20.19.2-150600.3.12.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs20-docs-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nodejs20-docs-20.19.2-150600.3.12.1">nodejs20-docs-20.19.2-150600.3.12.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm20-20.19.2-150600.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:npm20-20.19.2-150600.3.12.1">npm20-20.19.2-150600.3.12.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.

Impact:
* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.</Note>
    </Notes>
    <CVE>CVE-2025-23165</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.19.2-150600.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502045-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23165.html</URL>
        <Description>CVE-2025-23165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243217</URL>
        <Description>SUSE Bug 1243217</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.</Note>
    </Notes>
    <CVE>CVE-2025-23166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.19.2-150600.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502045-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23166.html</URL>
        <Description>CVE-2025-23166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243218</URL>
        <Description>SUSE Bug 1243218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`.
This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.

The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.

Impact:
* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.</Note>
    </Notes>
    <CVE>CVE-2025-23167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Web and Scripting 15 SP6:npm20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:corepack20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-devel-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nodejs20-docs-20.19.2-150600.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.6:npm20-20.19.2-150600.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502045-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23167.html</URL>
        <Description>CVE-2025-23167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243220</URL>
        <Description>SUSE Bug 1243220</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
