[Git][security-tracker-team/security-tracker][master] Track fixed version for nodejs issues fixed via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jan 14 06:14:04 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7c2835d8 by Salvatore Bonaccorso at 2026-01-14T07:12:17+01:00
Track fixed version for nodejs issues fixed via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,8 +1,8 @@
CVE-2025-55132 [fs.futimes() Bypasses Read-Only Permission Model]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#fsfutimes-bypasses-read-only-permission-model-cve-2025-55132---low
CVE-2026-21637 [TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#tls-pskalpn-callback-exceptions-bypass-error-handlers-causing-dos-and-fd-leak-cve-2026-21637---medium
CVE-2026-21636 [Node.js permission model bypass via unchecked Unix Domain Socket connections (UDS)]
- nodejs <not-affected> (Only affects Node.js v25)
@@ -11,16 +11,16 @@ CVE-2025-59464 [Memory leak that enables remote Denial of Service against applic
- nodejs <unfixed>
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#memory-leak-that-enables-remote-denial-of-service-against-applications-processing-tls-client-certificates-cve-2025-59464---medium
CVE-2025-59466 [Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#uncatchable-maximum-call-stack-size-exceeded-error-on-nodejs-via-async_hooks-leads-to-process-crashes-bypassing-error-handlers-cve-2025-59466---medium
CVE-2025-59465 [Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#nodejs-http2-server-crashes-with-unhandled-error-when-receiving-malformed-headers-frame-cve-2025-59465---high
CVE-2025-55130 [Bypass File System Permissions using crafted symlinks]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#bypass-file-system-permissions-using-crafted-symlinks-cve-2025-55130---high
CVE-2025-55131 [Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled]
- - nodejs <unfixed>
+ - nodejs 22.22.0+dfsg+~cs22.19.6-1
NOTE: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases#timeout-based-race-conditions-make-uint8arraybufferalloc-non-zerofilled-cve-2025-55131---high
CVE-2026-0908
- chromium 144.0.7559.59-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c2835d8d5edfa23285e885eaf5c147bcc64266d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c2835d8d5edfa23285e885eaf5c147bcc64266d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260114/ed6f2329/attachment.htm>
More information about the debian-security-tracker-commits
mailing list