-
Notifications
You must be signed in to change notification settings - Fork 590
[Medium]: Patch to upgrade llhttp from v6.1.1 to v9.1.2 to address CVE-2025-23167 #14352
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Hi @Kanishk-Bansal, -Thank you! |
b67189b
to
1ecd34b
Compare
Hi @Kanishk-Bansal and @kgodara912 This is the POC abhilash was using : CVE-2025-23167 : HTTP Parser Flaw in Node.js 20 Allows Request Smuggling Default response without patch : Binary with patch throws HTTP 400: -Thank you! |
@kgodara912, -Thank you! |
Hi @Kanishk-Bansal and @kgodara912, -Thank you! |
@Sumynwa. could you please share your review and signoff on this PR if all good? |
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-static
subpackages, etc.) have had theirRelease
tag incremented../cgmanifest.json
,./toolkit/scripts/toolchain/cgmanifest.json
,.github/workflows/cgmanifest.json
)./LICENSES-AND-NOTICES/SPECS/data/licenses.json
,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md
,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON
)*.signatures.json
filessudo make go-tidy-all
andsudo make go-test-coverage
passSummary
https://github.com/nodejs/llhttp/archive/refs/tags/release/v9.1.2.tar.gz
Change Log
Does this affect the toolchain?
NO
Associated issues
Links to CVEs
Test Methodology