Pop-Up Thingie

Too Lazy BBS
  • Home
  • Forum
  • Files
  • Chat
  • Bulletins
  • Register
  • Log in
  • Who's Online

  • System Info

    Sysop: Amessyroom
    Location: Fayetteville, NC
    Users: 28
    Nodes: 6 (0 / 6)
    Uptime: 51:08:05
    Calls: 422
    Files: 1,025
    Messages: 90,550

  1. Forum
  2. Usenet
  3. LINUX.DEBIAN.BUGS.DIST
  • Bug#1105860: node-undici: CVE-2025-47279

    From Salvatore Bonaccorso@21:1/5 to All on Fri May 16 12:40:01 2025
    Source: node-undici
    Version: 7.3.0+dfsg1+~cs24.12.11-1
    Severity: important
    Tags: security upstream
    Forwarded: https://github.com/nodejs/undici/issues/3895
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for node-undici.

    CVE-2025-47279[0]:
    | Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0,
    | 6.21.2, and 7.5.0, applications that use undici to implement a
    | webhook-like system are vulnerable. If the attacker set up a server
    | with an invalid certificate, and they can force the application to
    | call the webhook repeatedly, then they can cause a memory leak. This
    | has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a
    | workaound, avoid calling a webhook repeatedly if the webhook fails.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-47279
    https://www.cve.org/CVERecord?id=CVE-2025-47279
    [1] https://github.com/nodejs/undici/issues/3895
    [2] https://github.com/nodejs/undici/pull/4088

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)

© Too Lazy BBS, 2025