Skip to content

Commit feff744

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent ed8dac1 commit feff744

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

docs/rules-v1.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"lastUpdatedDate": "2025-05-19T13:38:39.178Z",
2+
"lastUpdatedDate": "2025-05-20T02:48:28.891Z",
33
"name": "Node Version Audit",
44
"website": "https://github.com/lightswitch05/node-version-audit",
55
"license": "https://github.com/lightswitch05/node-version-audit/blob/master/LICENSE",
@@ -5413,21 +5413,21 @@
54135413
"id": "CVE-2025-23165",
54145414
"baseScore": null,
54155415
"publishedDate": "2025-05-19T02:15:00.000Z",
5416-
"lastModifiedDate": "2025-05-19T02:15:00.000Z",
5416+
"lastModifiedDate": "2025-05-19T14:15:00.000Z",
54175417
"description": "In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.\r\n\r\nImpact:\r\n* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22."
54185418
},
54195419
"CVE-2025-23166": {
54205420
"id": "CVE-2025-23166",
54215421
"baseScore": null,
54225422
"publishedDate": "2025-05-19T02:15:00.000Z",
5423-
"lastModifiedDate": "2025-05-19T02:15:00.000Z",
5423+
"lastModifiedDate": "2025-05-19T15:15:00.000Z",
54245424
"description": "The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime."
54255425
},
54265426
"CVE-2025-23167": {
54275427
"id": "CVE-2025-23167",
54285428
"baseScore": null,
54295429
"publishedDate": "2025-05-19T02:15:00.000Z",
5430-
"lastModifiedDate": "2025-05-19T02:15:00.000Z",
5430+
"lastModifiedDate": "2025-05-19T16:15:00.000Z",
54315431
"description": "A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade."
54325432
}
54335433
}

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "node-version-audit",
3-
"version": "1.20250519.0",
3+
"version": "1.20250520.0",
44
"description": "Audit your Node version for known CVEs and patches ",
55
"main": "index.js",
66
"scripts": {

0 commit comments

Comments
 (0)