Security update for nodejs20
| Announcement ID: | SUSE-SU-2026:1363-1 |
|---|---|
| Release Date: | 2026-04-15T14:16:21Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for nodejs20 fixes the following issues:
Update to version 20.20.2.
- CVE-2026-21717: trivially predictable hash collisions due to flaw in V8's string hashing mechanism allows for performance degradation via a crafted request (bsc#1260494).
- CVE-2026-21716: incomplete fix for CVE-2024-36137 allows promise-based FileHandle methods to be used to modify file permissions and ownership on already-open file descriptors (bsc#1260462).
- CVE-2026-21715: flaw in the Permission Model filesystem enforcement allows for file existence disclosure and
filesystem path enumeration via
fs.realpathSync.native()(bsc#1260482). - CVE-2026-21714: memory leak in Node.js HTTP/2 server allows for resource exhaustion via
WINDOW_UPDATEframes sent on stream 0 (bsc#1260480). - CVE-2026-21713: timing side-channel due to flaw in Node.js HMAC verification allows for discovery of HMAC values and potential MAC forgery (bsc#1260463).
- CVE-2026-21710: uncaught
TypeErrorwhen handling HTTP requests allows for a process crash via requests with a header named__proto__when the application accessesreq.headersDistinct(bsc#1260455). - CVE-2026-21637: flaw in TLS error handling allows for resource exhaustion and crash when
pskCallbackorALPNCallbackare in use (bsc#1256576).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1363=1 -
openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1363=1 -
SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1363=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
- nodejs20-20.20.2-150600.3.18.1
- nodejs20-debugsource-20.20.2-150600.3.18.1
- npm20-20.20.2-150600.3.18.1
- nodejs20-debuginfo-20.20.2-150600.3.18.1
- nodejs20-devel-20.20.2-150600.3.18.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
- nodejs20-docs-20.20.2-150600.3.18.1
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- nodejs20-20.20.2-150600.3.18.1
- nodejs20-debugsource-20.20.2-150600.3.18.1
- npm20-20.20.2-150600.3.18.1
- nodejs20-debuginfo-20.20.2-150600.3.18.1
- nodejs20-devel-20.20.2-150600.3.18.1
- corepack20-20.20.2-150600.3.18.1
-
openSUSE Leap 15.6 (noarch)
- nodejs20-docs-20.20.2-150600.3.18.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
- nodejs20-20.20.2-150600.3.18.1
- nodejs20-debugsource-20.20.2-150600.3.18.1
- npm20-20.20.2-150600.3.18.1
- nodejs20-debuginfo-20.20.2-150600.3.18.1
- nodejs20-devel-20.20.2-150600.3.18.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
- nodejs20-docs-20.20.2-150600.3.18.1
References:
- https://www.suse.com/security/cve/CVE-2026-21637.html
- https://www.suse.com/security/cve/CVE-2026-21710.html
- https://www.suse.com/security/cve/CVE-2026-21713.html
- https://www.suse.com/security/cve/CVE-2026-21714.html
- https://www.suse.com/security/cve/CVE-2026-21715.html
- https://www.suse.com/security/cve/CVE-2026-21716.html
- https://www.suse.com/security/cve/CVE-2026-21717.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256576
- https://bugzilla.suse.com/show_bug.cgi?id=1260455
- https://bugzilla.suse.com/show_bug.cgi?id=1260462
- https://bugzilla.suse.com/show_bug.cgi?id=1260463
- https://bugzilla.suse.com/show_bug.cgi?id=1260480
- https://bugzilla.suse.com/show_bug.cgi?id=1260482
- https://bugzilla.suse.com/show_bug.cgi?id=1260494