Bugzilla – Bug 1224310
VUL-0: CVE-2024-4068: xpra-html5: the npm package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion
Last modified: 2024-05-17 08:22:18 UTC
The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-4068 https://www.cve.org/CVERecord?id=CVE-2024-4068 https://devhub.checkmarx.com/cve-details/CVE-2024-4068/ https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308 https://github.com/micromatch/braces/issues/35
A vulnerable version (3.0.2) of the braces package is embedded in: - openSUSE:Factory/xpra-html5 Upstream issue: https://github.com/micromatch/braces/issues/35
I have opened https://github.com/Xpra-org/xpra-html5/issues/306 upstream to get Xpra's take on things.
(In reply to Scott Bradnick from comment #2) > I have opened https://github.com/Xpra-org/xpra-html5/issues/306 upstream to > get Xpra's take on things. Upstream developer said: "I'm not really bothered about build time stuff. Also happy to remove the lot." I'll follow up in due time to see if they're removed. Additionally, I see https://github.com/micromatch/braces/pull/37 - so maybe "braces" will be 'fixed'.
Not shipped with xpra-html5 but only used as commit hook: https://github.com/Xpra-org/xpra-html5/issues/306#issuecomment-2116518229 Nothing to do, closing.