Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
|
Important Review skippedReview was skipped due to path filters ⛔ Files ignored due to path filters (6)
CodeRabbit blocks several paths by default. You can override this behavior by explicitly including those paths in the path filters. For example, including You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #1268 +/- ##
==========================================
- Coverage 80.78% 80.76% -0.02%
==========================================
Files 205 205
Lines 10929 10929
==========================================
- Hits 8829 8827 -2
Misses 1524 1524
- Partials 576 578 +2 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
18f742c to
2627e67
Compare
This PR contains the following updates:
v2.11.8->v2.11.12GitHub Vulnerability Alerts
CVE-2026-27571
Impact
The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. The implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons.
An attacker can use a compression bomb to cause excessive memory consumption, often resulting in the operating system terminating the server process.
The use of compression is negotiated before authentication, so this does not require valid NATS credentials to exploit.
The fix was to bounds the decompression to fail once the message was too large, instead of continuing on.
Patches
This was released in nats-server without being highlighted as a security issue. It should have been, this was an oversight. Per the NATS security policy, because this does not require a valid user, it is CVE-worthy.
This was fixed in the v2.11 series with v2.11.12 and in the v2.12 series with v2.12.3.
Workarounds
This only affects deployments which use WebSockets and which expose the network port to untrusted end-points.
References
This was reported to the NATS maintainers by Pavel Kohout of Aisle Research (www.aisle.com).
nats-server websockets are vulnerable to pre-auth memory DoS in github.com/nats-io/nats-server
BIT-nats-2026-27571 / CVE-2026-27571 / GHSA-qrvq-68c2-7grw / GO-2026-4533
More information
Details
nats-server websockets are vulnerable to pre-auth memory DoS in github.com/nats-io/nats-server
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
nats-server websockets are vulnerable to pre-auth memory DoS
BIT-nats-2026-27571 / CVE-2026-27571 / GHSA-qrvq-68c2-7grw / GO-2026-4533
More information
Details
Impact
The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. The implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons.
An attacker can use a compression bomb to cause excessive memory consumption, often resulting in the operating system terminating the server process.
The use of compression is negotiated before authentication, so this does not require valid NATS credentials to exploit.
The fix was to bounds the decompression to fail once the message was too large, instead of continuing on.
Patches
This was released in nats-server without being highlighted as a security issue. It should have been, this was an oversight. Per the NATS security policy, because this does not require a valid user, it is CVE-worthy.
This was fixed in the v2.11 series with v2.11.12 and in the v2.12 series with v2.12.3.
Workarounds
This only affects deployments which use WebSockets and which expose the network port to untrusted end-points.
References
This was reported to the NATS maintainers by Pavel Kohout of Aisle Research (www.aisle.com).
Severity
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
nats-io/nats-server (github.com/nats-io/nats-server/v2)
v2.11.12Compare Source
Changelog
Refer to the 2.11 Upgrade Guide for backwards compatibility notes with 2.10.x.
Go Version
Dependencies
Added
General
ping_internalin thewebsocketblock (#7614)Monitoring
tls_cert_not_afterto thevarzmonitoring endpoint for showing when TLS certificates are due to expire (#7709)Improved
JetStream
MQTT
Fixed
General
JetStream
AsyncFlushis enabled after a process pause (#7594)corrupt record stateerror (#7627)no idx presentcache errors (#7634)$JS.>namespace (#7720)cluster_trafficin config mode has been fixed (#7723)MQTT
$MQTT.subscriptions are now handled implicitly, with the exception ofdenyACLs which still permit restriction (#7637)Complete Changes
v2.11.11Compare Source
Changelog
Refer to the 2.11 Upgrade Guide for backwards compatibility notes with 2.10.x.
Go Version
Dependencies
070ab1a(#7539)Added
JetStream
meta_compactandmeta_compact_size, advanced JetStream config options to control how many log entries must be present in the metalayer log before snapshotting and compaction takes place (#7484, #7521)write_timeoutoption for clients, routes, gateways and leafnodes which controls the behaviour on reaching thewrite_deadline, values can bedefault,retryorclose(#7513)Monitoring
/jszendpoint (#7524)/jszendpoint can now show direct consumers with thedirect-consumers?trueflag (#7543)Improved
General
JetStream
max_bytesandmax_msgslimits (#7455)>for both republish source and destination (#7515)Monitoring
jszmonitoring endpoint can now report leader counts (#7429)Fixed
General
JetStream
sync_alwaysfor writing TTL and scheduling state files (#7385)Complete Changes
v2.11.10Compare Source
Changelog
Refer to the 2.11 Upgrade Guide for backwards compatibility notes with 2.10.x.
Go Version
Dependencies
Improved
General
accstatszresponses if empty (#7300)JetStream
opt_start_timeon consumers orstart_timeon message get requests, now use a binary search for improved lookup performance (#7357)Fixed
General
SIGTERMsignal immediately after startup (#7367)JetStream
stream.Aandstream.*.A, fixing some consumer or message get filters (#7349)Complete Changes
v2.11.9Compare Source
Changelog
Refer to the 2.11 Upgrade Guide for backwards compatibility notes with 2.10.x.
Go Version
Dependencies
Improved
JetStream
raftzendpoint now reports the cluster traffic account (#7186)leader_since(#7189)system_accountandtraffic_account(#7193)jszmonitoring endpoint now returnssystem_accountandtraffic_account(#7193)Fixed
General
default_sentinelJWT from a scoped signing key instead of requiring it to solely be a bearer token for auth callout (#7217)JetStream
Nats-TTLheader will now be correct if the subject delete marker TTL overwrites it (#7177)cluster_trafficstate for an account is now restored correctly when enabling JetStream at startup (#7191)Tests
Complete Changes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.