Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.DEBIAN.BUGS.DIST
  • Bug#1105860: node-undici: CVE-2025-47279

    From Salvatore Bonaccorso@21:1/5 to All on Fri May 16 12:40:01 2025
    Source: node-undici
    Version: 7.3.0+dfsg1+~cs24.12.11-1
    Severity: important
    Tags: security upstream
    Forwarded: https://github.com/nodejs/undici/issues/3895
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for node-undici.

    CVE-2025-47279[0]:
    | Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0,
    | 6.21.2, and 7.5.0, applications that use undici to implement a
    | webhook-like system are vulnerable. If the attacker set up a server
    | with an invalid certificate, and they can force the application to
    | call the webhook repeatedly, then they can cause a memory leak. This
    | has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a
    | workaound, avoid calling a webhook repeatedly if the webhook fails.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-47279
    https://www.cve.org/CVERecord?id=CVE-2025-47279
    [1] https://github.com/nodejs/undici/issues/3895
    [2] https://github.com/nodejs/undici/pull/4088

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 482
    Nodes: 16 (2 / 14)
    Uptime: 63:05:32
    Calls: 9,569
    Files: 13,663
    Messages: 6,143,629

© >>> Magnum BBS <<<, 2025