Hi Jérémy,

On Thu, May 15, 2025 at 10:50:34PM +0200, Jérémy Lal wrote:
> Le jeu. 15 mai 2025 à 21:51, Salvatore Bonaccorso <car...@debian.org> a
> écrit :
> 
> > Source: nodejs
> > Version: 20.19.0+dfsg1-1
> > Severity: grave
> > Tags: security upstream
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team <
> > t...@security.debian.org>
> >
> > Hi,
> >
> > The following vulnerabilities were published for nodejs.
> >
> > CVE-2025-23165[0]:
> > | Corrupted pointer in node::fs::ReadFileUtf8(const
> > | FunctionCallbackInfo<Value>& args) when args[0] is a string
> >
> >
> > CVE-2025-23166[1]:
> > | Improper error handling in async cryptographic operations
> > | crashes process
> >
> >
> > CVE-2025-23167[2]:
> > | Improper HTTP header block termination in llhttp
> >
> 
> As I read it, it seemed that this affects only llhttp - which is
> distributed by node-undici right now ?
> 
> Also https://nodejs.org/en/blog/release/v20.19.2/
> mentions
> CVE-2024-27982 http: do not allow OBS fold in headers by default

Thanks, will have look on what we need to change for the tracking
information on security-tracker!

Regards,
Salvatore

Reply via email to