[security][CRITICAL] nodejs 24.12.0: 4 CVE require triage #2
Labels
No labels
ai-summary
bot
cve
llm-analysis
needs-build
needs-triage
priority/high
security
security-release
severity-critical
source-nvd
update/major
upstream-update
upstream/github
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
rpms/nodejs#2
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CVE triage request / Запрос на разбор CVE
Package / Пакет
nodejs24.12.024.12.0-1standardleaf-base-teamCRITICAL9.14LLM recommendation / Рекомендация LLM
RU
Критические уязвимости в Node.js (v24.12.0), включая обход ограничений файловой системы (CVE-2025-55130), DoS через ошибки HTTP/2 (CVE-2025-59465), неконтролируемые краши при глубокой рекурсии (CVE-2025-59466) и проблемы обработки TLS (CVE-2026-21637).
Немедленно обновить пакет nodejs до версии, содержащей исправления для всех перечисленных CVE. До обновления проверить наличие обработчиков ошибок для secureConnection и убедиться, что приложения не используют небезопасные паттерны с async_hooks.
Рекомендуемое действие:
needs_triageПодсказка по целевой версии:
-Проверки: 1. Проверить версию установленного nodejs. 2. Попробовать воспроизвести сценарий обхода --allow-fs-read с использованием относительных ссылок. 3. Проверить стабильность сервера при нагрузке с некорректными HTTP/2 заголовками. 4. Тестирование глубокой рекурсии в коде с включенным async_hooks.createHook().
Риски: Полный компрометация системы через чтение/запись файлов вне разрешенных путей, отказ в обслуживании (DoS) веб-серверов и приложений, неконтролируемые краши процессов без возможности восстановления.
EN
Critical vulnerabilities in Node.js (v24.12.0), including filesystem permission bypass (CVE-2025-55130), HTTP/2 DoS (CVE-2025-59465), uncatchable crashes via deep recursion (CVE-2025-59466), and TLS error handling issues (CVE-2026-21637).
Immediately update the nodejs package to a version containing fixes for all listed CVEs. Prior to updating, verify that applications have explicit error handlers for secureConnection and do not use unsafe async_hooks patterns.
Recommended action:
needs_triageTarget version hint:
-Tests: 1. Verify installed nodejs version. 2. Attempt to reproduce the --allow-fs-read bypass using relative symlinks. 3. Test server stability under load with malformed HTTP/2 headers. 4. Test deep recursion scenarios with async_hooks.createHook() enabled.
Risks: Full system compromise via reading/writing files outside allowed paths, Denial of Service (DoS) for web servers and applications, and uncontrolled process crashes without recovery capability.
CVE candidates from NVD/CPE
Descriptions
CVE-2025-55130
A flaw in Node.js’s Permissions model allows attackers to bypass
--allow-fs-readand--allow-fs-writerestrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
CVE-2025-59465
A malformed
HTTP/2 HEADERSframe with oversized, invalidHPACKdata can cause Node.js to crash by triggering an unhandledTLSSocketerrorECONNRESET. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:CVE-2025-59466
We have identified a bug in Node.js error handling where "Maximum call stack size exceeded" errors become uncatchable when
async_hooks.createHook()is enabled. Instead of reachingprocess.on('uncaughtException'), the process terminates, making the crash unrecoverable. Applications that rely onAsyncLocalStorage(v22, v20) orasync_hooks.createHook()(v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.CVE-2026-21637
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when
pskCallbackorALPNCallbackare in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.Maintainer checklist
affected,fixed,not_affected,false_positive,deferred, ornot_in_cloud_image.niceos_cve_triageentry.NICE-SAadvisory if a security update is shipped.Machine metadata