[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-290 --- nodejs

ID: oval:org.secpod.oval:def:19500325Date: (C)2024-01-04   (M)2024-02-19
Class: PATCHFamily: unix




Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service via the function new Range, when untrusted user data is provided as a range. Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's HTTP/2 codec may leak a header map and bookkeeping structures upon receiving 'RST_STREAM' immediately followed by the 'GOAWAY' frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the 'GOAWAY' frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to 'GOAWAY' frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions 1.26.3, 1.25.8, 1.24.9, 1.23.11

Platform:
Amazon Linux 2023
Product:
nodejs
v8-devel
npm
Reference:
ALAS2023-2023-290
CVE-2022-25883
CVE-2023-35945
CVE    2
CVE-2023-35945
CVE-2022-25883
CPE    2
cpe:/a:npm:npm
cpe:/a:nodejs:nodejs

© SecPod Technologies