Name | CVE-2024-4068 |
Description | The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1071632 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
node-braces (PTS) | stretch | 2.0.2-1 | vulnerable |
buster | 2.0.2-2 | vulnerable | |
bullseye | 3.0.2+~3.0.0-1 | vulnerable | |
bookworm | 3.0.2+~3.0.1-1 | vulnerable | |
sid, trixie | 3.0.3+~3.0.4-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
node-braces | source | stretch | (unfixed) | end-of-life | ||
node-braces | source | (unstable) | (unfixed) | 1071632 |
[bookworm] - node-braces <no-dsa> (Minor issue)
[bullseye] - node-braces <no-dsa> (Minor issue)
[buster] - node-braces <postponed> (Minor issue)
https://github.com/micromatch/braces/issues/35