Skip to content
This repository has been archived by the owner on May 23, 2024. It is now read-only.

Memory leak detected in version 1.0.6 by veracode #18

Closed
ccalderon9411 opened this issue Jul 25, 2023 · 12 comments
Closed

Memory leak detected in version 1.0.6 by veracode #18

ccalderon9411 opened this issue Jul 25, 2023 · 12 comments

Comments

@ccalderon9411
Copy link

Veracode has detected a memory leak vulnerability

@nik750
Copy link

nik750 commented Aug 4, 2023

Any update on this vulnarability?

@nik750
Copy link

nik750 commented Aug 4, 2023

Memory Leak: inflight is vulnerable to a Memory Leak. The vulnerability is due to lack of restrictions on how many callbacks the library can concurrently support, which can result in a NodeJS out of heap memory crash.
Still getting this error.

@Cuttsy27
Copy link

Cuttsy27 commented Aug 7, 2023

Also wondering if this issue persists? Looks like glob up to glob@9 depends on inflight and other packages in our project depend on glob@<9 so we are stuck with the memory leak warnings in CI

@Tedderic
Copy link

Hello, any update on this?

@krishnamohanparuchuri
Copy link

veracode detected a memory leak vulnerability @1.0.6

@rennerg
Copy link

rennerg commented Aug 22, 2023

Is this repo dead?

@relaxnow
Copy link

relaxnow commented Aug 29, 2023

In isaacs/node-glob#435 @isaacs mentioned that newer versions of glob >= 9 no longer use inflight.
The remediation for those using older versions of glob would then, presumably be, to upgrade to a newer version.

Sadly, this may not be an option for projects with other transitive dependencies (npmjs.com lists 1628 dependents: https://www.npmjs.com/package/inflight?activeTab=dependents ).
These would all be advised to move away as this library looks to be abandoned.

Unfortunately, in the mean-time applications that transitively use this library would need to determine how they are using this library to determine if they are vulnerable.
Note that the impact of this would be a Denial of Service but would require an attacker to trigger many requests (we were able to reproduce this with millions of simple requests, that may be less in other cases).

It looks like @GreihMurray has been working on using an arbitrary limit of 500 concurrent requests: main...GreihMurray:inflight-fork:main .
This might help but would need to be tested. Also 500 requests may not be enough for some purposes and I'm not sure what happens > 500 requests.

Maybe someone else (more familiar with how this is used) could help out here and provide a PR / fixed fork?

@GreihMurray
Copy link

In isaacs/node-glob#435 @isaacs mentioned that newer versions of glob >= 9 no longer use inflight.
The remediation for those using older versions of glob would then, presumably be, to upgrade to a newer version.

Sadly, this may not be an option for projects with other transitive dependencies (npmjs.com lists 1628 dependents: https://www.npmjs.com/package/inflight?activeTab=dependents ).
These would all be advised to move away as this library looks to be abandoned.

Unfortunately, in the mean-time applications that transitively use this library would need to determine how they are using this library to determine if they are vulnerable.
Note that the impact of this would be a Denial of Service but would require an attacker to trigger many requests (we were able to reproduce this with millions of simple requests, that may be less in other cases).

It looks like @GreihMurray has been working on using an arbitrary limit of 500 concurrent requests: main...GreihMurray:inflight-fork:main .
This might help but would need to be tested. Also 500 requests may not be enough for some purposes and I'm not sure what happens > 500 requests.

Maybe someone else (more familiar with how this is used) could help out here and provide a PR / fixed fork?

I've done a few basic tests to try and remedy this with no success. 500 was an arbitrary number which I just selected more or less at random while testing. Unfortunately I am unable to get it to work and would agree that the best practice is likely upgrade other dependencies as possible

OhmSpectator added a commit to uncovering-world/track-your-regions that referenced this issue Dec 3, 2023
…ersion.

Addressed a security vulnerability linked to older versions of the `glob`
package, as discussed in isaacs/inflight-DEPRECATED-DO-NOT-USE#18.
By setting the `glob` version to `10.3.10` in the overrides section of backend
`package.json` file, this commit resolves the issue by ensuring a safer
updated version of `glob` is used throughout the project.

Signed-off-by: Nikolay Martyanov <[email protected]>
OhmSpectator added a commit to uncovering-world/track-your-regions that referenced this issue Dec 3, 2023
…version.

Addressed a security vulnerability linked to older versions of the `glob`
package, as discussed in isaacs/inflight-DEPRECATED-DO-NOT-USE#18.
By setting the `glob` version to `10.3.10` in the overrides section of frontend
`package.json` file, this commit resolves the issue by ensuring a safer
updated version of `glob` is used throughout the project.

Signed-off-by: Nikolay Martyanov <[email protected]>
OhmSpectator added a commit to uncovering-world/track-your-regions that referenced this issue Dec 4, 2023
…ersion.

Addressed a security vulnerability linked to older versions of the `glob`
package, as discussed in isaacs/inflight-DEPRECATED-DO-NOT-USE#18.
By setting the `glob` version to `10.3.10` in the overrides section of backend
`package.json` file, this commit resolves the issue by ensuring a safer
updated version of `glob` is used throughout the project.

Signed-off-by: Nikolay Martyanov <[email protected]>
OhmSpectator added a commit to uncovering-world/track-your-regions that referenced this issue Dec 4, 2023
…version.

Addressed a security vulnerability linked to older versions of the `glob`
package, as discussed in isaacs/inflight-DEPRECATED-DO-NOT-USE#18.
By setting the `glob` version to `10.3.10` in the overrides section of frontend
`package.json` file, this commit resolves the issue by ensuring a safer
updated version of `glob` is used throughout the project.

Signed-off-by: Nikolay Martyanov <[email protected]>
@thetumper
Copy link

thetumper commented Dec 7, 2023

If anyone is seeing this transitively due to usage of pino-pretty, I entered an issue there:
mcollina/help-me#17

And related PR to fix:
mcollina/help-me#18

Please give those a thumbs up if you are affected. Thanks!

@0xSmiley
Copy link

Any update on this?

@isaacs
Copy link
Owner

isaacs commented Mar 5, 2024

@0xSmiley No

@isaacs
Copy link
Owner

isaacs commented May 23, 2024

#5 (comment)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests