QID 355802
Date Published: 2023-08-14
QID 355802: Amazon Linux Security Advisory for nodejs : ALAS2023-2023-290
Versions of the package semver before 7.5.2 are vulnerable to regular expression denial of service (redos) via the function new range, when untrusted user data is provided as a range. (
( CVE-2022-25883) envoy is a cloud-native high-performance edge/middle/service proxy.
Envoy's http/2 codec may leak a header map and bookkeeping structures upon receiving `rst_stream` immediately followed by the `goaway` frames from an upstream server.
In nghttp2, cleanup of pending requests due to receipt of the `goaway` frame skips de-allocation of the bookkeeping structure and pending compressed header.
The error return [code path] is taken if connection is already marked for not sending more requests due to `goaway` frame.
The clean-up code is right after the return statement, causing memory leak.
Denial of service through memory exhaustion.
This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11. (
( CVE-2023-35945)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-290 -
alas.aws.amazon.com/AL2023/ALAS-2023-290.html
CVEs related to QID 355802
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-290 | amazon linux 2023 |
|