Impact
Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.
Patches
This has been patched in #4088.
Workarounds
If a webhook fails, avoid keep calling it repeatedly.
References
Reported as: #3895
Impact
Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.
Patches
This has been patched in #4088.
Workarounds
If a webhook fails, avoid keep calling it repeatedly.
References
Reported as: #3895