From 1456ade12308524d2a662c96c7e5c11d64cdb5ab Mon Sep 17 00:00:00 2001 From: Ali Jaafer <93264687+i5d6@users.noreply.github.com> Date: Fri, 10 Apr 2026 15:56:14 +0300 Subject: [PATCH] Update Dockerfile A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact. --- Dockerfile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Dockerfile b/Dockerfile index 6e1fc27..f974158 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,4 +1,4 @@ -FROM node:19-alpine AS base +FROM node:22-alpine AS base # Install dependencies only when needed FROM base AS deps