The qs module before 1.0.0 does not have an option or default for
specifying object depth and when parsing a string representing a deeply
nested object will block the event loop for long periods of time. An
attacker could leverage this to cause a temporary denial-of-service
condition, for example, in a web application, other requests would not be
processed while this blocking is occurring.
ebarrettoNot much information, except for an advisory
Upstream:released (1.0.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.2.4-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.4-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (2.2.4-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (2.2.4-1)
More Information

Updated: 2020-07-28 18:23:12 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)