![]() |
|
Message-ID: <20250514235138.GA10938@openwall.com> Date: Thu, 15 May 2025 01:51:38 +0200 From: Solar Designer <solar@...nwall.com> To: Rafael Gonzaga <work@...aelgss.dev> Cc: oss-security@...ts.openwall.com Subject: Re: Fwd: Node.js security updates for all active release lines, May 2025 On Wed, May 14, 2025 at 02:47:32PM -0700, Rafael Gonzaga wrote: > The planned security releases are now available. You can read more about > the details at > https://nodejs.org/en/blog/vulnerability/may-2025-security-releases Thanks. Included below is the current content from: https://raw.githubusercontent.com/nodejs/nodejs.org/refs/heads/main/apps/site/pages/en/blog/vulnerability/may-2025-security-releases.md Alexander --- date: 2025-05-14T03:00:00.000Z category: vulnerability title: Wednesday, May 14, 2025 Security Releases slug: may-2025-security-releases layout: blog-post author: The Node.js Project --- ## Security releases available Updates are now available for the 24.x, 23.x, 22.x, 20.x Node.js release lines for the following issues. ## Improper error handling in async cryptographic operations crashes process (CVE-2025-23166) - (high) The C++ method `SignTraits::DeriveBits()` may incorrectly call `ThrowException()` based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime. Impact: - This vulnerability affects all users in active release lines: 20.x, 22.x, 23.x, 24.x Thank you, @panva and @tniessen, for reporting and fixing this vulnerability. ## Improper HTTP header block termination in llhttp (CVE-2025-23167) - (medium) A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: - This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade. Thank you, to kenballus for reporting this vulnerability and thank you RafaelGSS for fixing it. ## Corrupted pointer in `node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args)` when `args[0]` is a string. (CVE-2025-23165) - (low) In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service. Impact: - This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22. Thank you, to Justin Nietzel for reporting and fixing this vulnerability. ## Downloads and release details - [Node.js v20.19.2](/blog/release/v20.19.2/) - [Node.js v22.15.1](/blog/release/v22.15.1/) - [Node.js v23.11.1](/blog/release/v23.11.1/) - [Node.js v24.0.2](/blog/release/v24.0.2) # Summary The Node.js project will release new versions of the 24.x, 23.x, 22.x, 20.x releases lines on or shortly after, Wednesday, May 14, 2025 in order to address: - 1 high severity issues. - 1 medium severity issues. - 1 low severity issues. ## Impact - The 24.x release line of Node.js is vulnerable to 1 high severity issues. - The 23.x release line of Node.js is vulnerable to 1 high severity issues. - The 22.x release line of Node.js is vulnerable to 1 low severity issues, 1 high severity issues. - The 20.x release line of Node.js is vulnerable to 1 low severity issues, 1 high severity issues, 1 medium severity issues. It's important to note that End-of-Life versions are always affected when a security release occurs. To ensure your system's security, please use an up-to-date version as outlined in our [Release Schedule](https://github.com/nodejs/release#release-schedule). ## Release timing Releases will be available on, or shortly after, Wednesday, May 14, 2025. ## Contact and future updates The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/master/SECURITY.md> if you wish to report a vulnerability in Node.js. Subscribe to the low-volume announcement-only nodejs-sec mailing list at <https://groups.google.com/forum/#!forum/nodejs-sec> to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.