<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">Le jeu. 15 mai 2025 à 21:51, Salvatore Bonaccorso <<a href="mailto:carnil@debian.org">carnil@debian.org</a>> a écrit :<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Source: nodejs<br>
Version: 20.19.0+dfsg1-1<br>
Severity: grave<br>
Tags: security upstream<br>
X-Debbugs-Cc: <a href="mailto:carnil@debian.org" target="_blank">carnil@debian.org</a>, Debian Security Team <<a href="mailto:team@security.debian.org" target="_blank">team@security.debian.org</a>><br>
<br>
Hi,<br>
<br>
The following vulnerabilities were published for nodejs.<br>
<br>
CVE-2025-23165[0]:<br>
| Corrupted pointer in node::fs::ReadFileUtf8(const<br>
| FunctionCallbackInfo<Value>& args) when args[0] is a string<br>
<br>
<br>
CVE-2025-23166[1]:<br>
| Improper error handling in async cryptographic operations<br>
| crashes process<br>
<br>
<br>
CVE-2025-23167[2]:<br>
| Improper HTTP header block termination in llhttp<br></blockquote><div><br></div><div>As I read it, it seemed that this affects only llhttp - which is distributed by node-undici right now ?</div><div><br></div><div>Also <a href="https://nodejs.org/en/blog/release/v20.19.2/">https://nodejs.org/en/blog/release/v20.19.2/</a></div><div>mentions </div><div>CVE-2024-27982 http: do not allow OBS fold in headers by default</div><div><br></div><div>Jérémy</div></div></div>