Dismissed
Permalink
CVE-2026-25899
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- guile-fibers
- ocamlPackages.fiber
- ocamlPackages_latest.fiber
- @LeSuisse dismissed
Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation
Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.
References
- https://github.com/gofiber/fiber/security/advisories/GHSA-2mr3-m5q5-wgp6 x_refsource_CONFIRM
- https://github.com/gofiber/fiber/releases/tag/v3.1.0 x_refsource_MISC
Affected products
fiber
- ==>= 3.0.0, < 3.1.0
Ignored packages (3)
pkgs.guile-fibers
Concurrent ML-like concurrency for Guile
pkgs.ocamlPackages.fiber
Structured concurrency library
pkgs.ocamlPackages_latest.fiber
Structured concurrency library