<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs12</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1616-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-10-05T04:22:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-10-05T04:22:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-10-05T04:22:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs12</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs12 fixes the following issues:

- nodejs12 was updated to 12.18.4 LTS:
   - CVE-2020-8201: Fixed an HTTP Request Smuggling due to CR-to-Hyphen conversion (bsc#1176605).
   - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589).
   - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937).
- Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation
  on Aarch64 with gcc10 (bsc#1172686)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1616</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CMPMUA4PV5TIZ4ZIY7PTL3KUZIS2IAM/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1616-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172686</URL>
      <Description>SUSE Bug 1172686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173937</URL>
      <Description>SUSE Bug 1173937</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176589</URL>
      <Description>SUSE Bug 1176589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176605</URL>
      <Description>SUSE Bug 1176605</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15095/</URL>
      <Description>SUSE CVE CVE-2020-15095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8201/</URL>
      <Description>SUSE CVE CVE-2020-8201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8252/</URL>
      <Description>SUSE CVE CVE-2020-8252 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs12-12.18.4-lp152.3.6.1">
      <FullProductName ProductID="nodejs12-12.18.4-lp152.3.6.1">nodejs12-12.18.4-lp152.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs12-devel-12.18.4-lp152.3.6.1">
      <FullProductName ProductID="nodejs12-devel-12.18.4-lp152.3.6.1">nodejs12-devel-12.18.4-lp152.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs12-docs-12.18.4-lp152.3.6.1">
      <FullProductName ProductID="nodejs12-docs-12.18.4-lp152.3.6.1">nodejs12-docs-12.18.4-lp152.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm12-12.18.4-lp152.3.6.1">
      <FullProductName ProductID="npm12-12.18.4-lp152.3.6.1">npm12-12.18.4-lp152.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs12-12.18.4-lp152.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:nodejs12-12.18.4-lp152.3.6.1">nodejs12-12.18.4-lp152.3.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs12-devel-12.18.4-lp152.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:nodejs12-devel-12.18.4-lp152.3.6.1">nodejs12-devel-12.18.4-lp152.3.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs12-docs-12.18.4-lp152.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:nodejs12-docs-12.18.4-lp152.3.6.1">nodejs12-docs-12.18.4-lp152.3.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm12-12.18.4-lp152.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:npm12-12.18.4-lp152.3.6.1">npm12-12.18.4-lp152.3.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "&lt;protocol&gt;://[&lt;user&gt;[:&lt;password&gt;]@]&lt;hostname&gt;[:&lt;port&gt;][:][/]&lt;path&gt;". The password value is not redacted and is printed to stdout and also to any generated log files.</Note>
    </Notes>
    <CVE>CVE-2020-15095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:nodejs12-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-devel-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-docs-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:npm12-12.18.4-lp152.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CMPMUA4PV5TIZ4ZIY7PTL3KUZIS2IAM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15095.html</URL>
        <Description>CVE-2020-15095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173937</URL>
        <Description>SUSE Bug 1173937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Node.js &lt; 12.18.4 and &lt; 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.</Note>
    </Notes>
    <CVE>CVE-2020-8201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:nodejs12-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-devel-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-docs-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:npm12-12.18.4-lp152.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CMPMUA4PV5TIZ4ZIY7PTL3KUZIS2IAM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8201.html</URL>
        <Description>CVE-2020-8201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176605</URL>
        <Description>SUSE Bug 1176605</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The implementation of realpath in libuv &lt; 10.22.1, &lt; 12.18.4, and &lt; 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.</Note>
    </Notes>
    <CVE>CVE-2020-8252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:nodejs12-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-devel-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nodejs12-docs-12.18.4-lp152.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:npm12-12.18.4-lp152.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CMPMUA4PV5TIZ4ZIY7PTL3KUZIS2IAM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8252.html</URL>
        <Description>CVE-2020-8252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176589</URL>
        <Description>SUSE Bug 1176589</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
