Source: node-undici
Version: 7.3.0+dfsg1+~cs24.12.11-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/nodejs/undici/issues/3895
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for node-undici.

CVE-2025-47279[0]:
| Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0,
| 6.21.2, and 7.5.0, applications that use undici to implement a
| webhook-like system are vulnerable. If the attacker set up a server
| with an invalid certificate, and they can force the application to
| call the webhook repeatedly, then they can cause a memory leak. This
| has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a
| workaound, avoid calling a webhook repeatedly if the webhook fails.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-47279
    https://www.cve.org/CVERecord?id=CVE-2025-47279
[1] https://github.com/nodejs/undici/issues/3895
[2] https://github.com/nodejs/undici/pull/4088

Regards,
Salvatore

Reply via email to