Source: node-undici
Version: 7.3.0+dfsg1+~cs24.12.11-1
Severity: important
Tags: security upstream
Forwarded:
https://github.com/nodejs/undici/issues/3895
X-Debbugs-Cc:
carnil@debian.org, Debian Security Team <
team@security.debian.org>
Hi,
The following vulnerability was published for node-undici.
CVE-2025-47279[0]:
| Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0,
| 6.21.2, and 7.5.0, applications that use undici to implement a
| webhook-like system are vulnerable. If the attacker set up a server
| with an invalid certificate, and they can force the application to
| call the webhook repeatedly, then they can cause a memory leak. This
| has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a
| workaound, avoid calling a webhook repeatedly if the webhook fails.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0]
https://security-tracker.debian.org/tracker/CVE-2025-47279
https://www.cve.org/CVERecord?id=CVE-2025-47279
[1]
https://github.com/nodejs/undici/issues/3895
[2]
https://github.com/nodejs/undici/pull/4088
Regards,
Salvatore
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)