Date: Fri, 17 Apr 2026 12:22:07 +0000 From: Kai Knoblich <kai@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: f668526aa6c8 - main - security/vuxml: Document py-strawberry-graphql security issues Message-ID: <69e225ef.3bcfa.542dd204@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by kai: URL: https://cgit.FreeBSD.org/ports/commit/?id=f668526aa6c8f5bbdab90d017447ae216a8ca2e8 commit f668526aa6c8f5bbdab90d017447ae216a8ca2e8 Author: Kai Knoblich <kai@FreeBSD.org> AuthorDate: 2026-04-17 12:21:33 +0000 Commit: Kai Knoblich <kai@FreeBSD.org> CommitDate: 2026-04-17 12:21:33 +0000 security/vuxml: Document py-strawberry-graphql security issues * CVE-2026-35523 - 7.5 * CVE-2026-35526 - 7.5 --- security/vuxml/vuln/2026.xml | 70 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 70 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index 8ea63e9e1030..15b848a1cbc5 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,73 @@ + <vuln vid="6a0aa20d-399f-11f1-8626-901b0edee044"> + <topic>py-strawberry-graphql -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>py310-strawberry-graphql</name> + <name>py311-strawberry-graphql</name> + <name>py312-strawberry-graphql</name> + <name>py313-strawberry-graphql</name> + <name>py313t-strawberry-graphql</name> + <name>py314-strawberry-graphql</name> + <range><lt>0.312.3</lt></range> + </package> + <package> + <name>py310-dj52-strawberry-graphql</name> + <name>py311-dj52-strawberry-graphql</name> + <name>py312-dj52-strawberry-graphql</name> + <name>py313-dj52-strawberry-graphql</name> + <name>py313t-dj52-strawberry-graphql</name> + <name>py314-dj52-strawberry-graphql</name> + <range><lt>0.312.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Strawberry GraphQL project reports:</p> + <blockquote cite="https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-vpwc-v33q-mq89"> + <p>Strawberry up until version 0.312.3 is vulnerable to an authentication bypass + on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler + does not verify that a 'connection_init' handshake has been completed before + processing start (subscription) messages. This allows a remote attacker to skip + the 'on_ws_connect' authentication hook entirely by connecting with the + graphql-ws subprotocol and sending a start message directly, without ever + sending 'connection_init'. + + The graphql-transport-ws subprotocol handler is not affected, as it correctly + gates subscription operations on a connection_acknowledged flag. However, both + subprotocols are enabled by default in all framework integrations that support + websockets, and the subprotocol is selected by the client via the + Sec-WebSocket-Protocol header. + + Any application relying on 'on_ws_connect' for authentication or authorization + is affected.</p> + </blockquote> + <blockquote cite="https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-hv3w-m4g2-5x77"> + <p>Strawberry GraphQL's WebSocket subscription handlers for both the + 'graphql-transport-ws' and legacy 'graphql-ws' protocols allocate an + asyncio.Task and associated Operation object for every incoming subscribe + message without enforcing any limit on the number of active subscriptions per + connection. + + An unauthenticated attacker can open a single WebSocket connection, send + connection_init, and then flood subscribe messages with unique IDs. Each + message unconditionally spawns a new 'asyncio.Task' and async generator, + causing linear memory growth and event loop saturation. This leads to server + degradation or an OOM crash.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2026-35523</cvename> + <url>https://www.cve.org/CVERecord?id=CVE-2026-35523</url> + <cvename>CVE-2026-35526</cvename> + <url>https://www.cve.org/CVERecord?id=CVE-2026-35526</url> + </references> + <dates> + <discovery>2026-04-04</discovery> + <entry>2026-04-17</entry> + </dates> + </vuln> + <vuln vid="6ae8f9e5-3a26-11f1-b60b-b42e991fc52e"> <topic>Mozilla -- Memory safety bugs</topic> <affects>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69e225ef.3bcfa.542dd204>
