{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs20":"20.20.0-150500.11.24.1","nodejs20-devel":"20.20.0-150500.11.24.1","nodejs20-docs":"20.20.0-150500.11.24.1","npm20":"20.20.0-150500.11.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.20.0-150500.11.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.20.0-150500.11.24.1","nodejs20-devel":"20.20.0-150500.11.24.1","nodejs20-docs":"20.20.0-150500.11.24.1","npm20":"20.20.0-150500.11.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.20.0-150500.11.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.20.0-150500.11.24.1","nodejs20-devel":"20.20.0-150500.11.24.1","nodejs20-docs":"20.20.0-150500.11.24.1","npm20":"20.20.0-150500.11.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.20.0-150500.11.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs20":"20.20.0-150500.11.24.1","nodejs20-devel":"20.20.0-150500.11.24.1","nodejs20-docs":"20.20.0-150500.11.24.1","npm20":"20.20.0-150500.11.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"nodejs20","purl":"pkg:rpm/suse/nodejs20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20.20.0-150500.11.24.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs20 fixes the following issues:\n\n- Update to 20.20.0:\n- CVE-2026-22036: Updated undici to 6.23.0 (bsc#1256848)\n- CVE-2025-59465: Add TLSSocket default error handler (bsc#1256573)\n- CVE-2025-55132: Disable futimes when permission model is enabled (bsc#1256571)\n- CVE-2025-55130: Require full read and write to symlink APIs (bsc#1256569)\n- CVE-2025-59466: Rethrow stack overflow exceptions in async_hooks (bsc#1256574)\n- CVE-2025-55131: Refactor unsafe buffer creation to remove zero-fill toggle (bsc#1256570)\n- CVE-2026-21637: Route callback exceptions through error handlers (bsc#1256576)\n","id":"SUSE-SU-2026:0457-1","modified":"2026-02-11T22:21:23Z","published":"2026-02-11T22:21:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260457-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-55130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-55131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-55132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-59465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-59466"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-21637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22036"}],"related":["CVE-2025-55130","CVE-2025-55131","CVE-2025-55132","CVE-2025-59465","CVE-2025-59466","CVE-2026-21637","CVE-2026-22036"],"summary":"Security update for nodejs20","upstream":["CVE-2025-55130","CVE-2025-55131","CVE-2025-55132","CVE-2025-59465","CVE-2025-59466","CVE-2026-21637","CVE-2026-22036"]}