Source: node-socket.io-parser
Version: 4.2.1+~3.1.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 4.2.1+~3.1.0-2

Hi,

The following vulnerability was published for node-socket.io-parser.

CVE-2026-33151[0]:
| Socket.IO is an open source, real-time, bidirectional, event-based,
| communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6,
| a specially crafted Socket.IO packet can make the server wait for a
| large number of binary attachments and buffer them, which can be
| exploited to make the server run out of memory. This issue has been
| patched in versions 3.3.5, 3.4.4, and 4.2.6.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33151
    https://www.cve.org/CVERecord?id=CVE-2026-33151
[1] 
https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9

Regards,
Salvatore

Reply via email to