Source: nats-server
Version: 2.10.27-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for nats-server.

CVE-2026-27571[0]:
| NATS-Server is a High-Performance server for NATS.io, a cloud and
| edge native messaging system. The WebSockets handling of NATS
| messages handles compressed messages via the WebSockets negotiated
| compression. Prior to versions 2.11.2 and 2.12.3, the implementation
| bound the memory size of a NATS message but did not independently
| bound the memory consumption of the memory stream when constructing
| a NATS message which might then fail validation for size reasons. An
| attacker can use a compression bomb to cause excessive memory
| consumption, often resulting in the operating system terminating the
| server process. The use of compression is negotiated before
| authentication, so this does not require valid NATS credentials to
| exploit. The fix, present in versions 2.11.2 and 2.12.3, was to
| bounds the decompression to fail once the message was too large,
| instead of continuing on. The vulnerability only affects deployments
| which use WebSockets and which expose the network port to untrusted
| end-points.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-27571
    https://www.cve.org/CVERecord?id=CVE-2026-27571
[1] 
https://github.com/nats-io/nats-server/security/advisories/GHSA-qrvq-68c2-7grw
[2] 
https://github.com/nats-io/nats-server/commit/f77fb7c4535e6727cc1a2899cd8e6bbdd8ba2017

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to