{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs20":"20.18.2-150500.11.18.1","nodejs20-devel":"20.18.2-150500.11.18.1","nodejs20-docs":"20.18.2-150500.11.18.1","npm20":"20.18.2-150500.11.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.18.2-150500.11.18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.18.2-150500.11.18.1","nodejs20-devel":"20.18.2-150500.11.18.1","nodejs20-docs":"20.18.2-150500.11.18.1","npm20":"20.18.2-150500.11.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.18.2-150500.11.18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.18.2-150500.11.18.1","nodejs20-devel":"20.18.2-150500.11.18.1","nodejs20-docs":"20.18.2-150500.11.18.1","npm20":"20.18.2-150500.11.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.18.2-150500.11.18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.18.2-150500.11.18.1","nodejs20-devel":"20.18.2-150500.11.18.1","nodejs20-docs":"20.18.2-150500.11.18.1","npm20":"20.18.2-150500.11.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.18.2-150500.11.18.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs20 fixes the following issues:\n\nUpdate to 20.18.2:\n\n- CVE-2025-23083: Fixed worker permission bypass via InternalWorker leak in diagnostics (bsc#1236251)\n- CVE-2025-23085: Fixed HTTP2 memory leak on premature close and ERR_PROTO (bsc#1236250)\n- CVE-2025-22150: Fixed insufficiently random values used when defining the boundary for a multipart/form-data request in undici (bsc#1236258)\n","id":"SUSE-SU-2025:0232-1","modified":"2025-01-24T14:33:49Z","published":"2025-01-24T14:33:49Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250232-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23085"}],"related":["CVE-2025-22150","CVE-2025-23083","CVE-2025-23085"],"summary":"Security update for nodejs20","upstream":["CVE-2025-22150","CVE-2025-23083","CVE-2025-23085"]}