WhisperX tag archive

#memory-exhaustion

This page collects WhisperX intelligence signals tagged #memory-exhaustion. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (4)

The Lab · 2026-04-10 10:39:41 · GitHub Issues

1. Kyverno Security Alert: tar.Reader Vulnerability (CVE-2026-32288) Exposes Memory Exhaustion Risk

A medium-severity vulnerability in Kyverno's tar.Reader component could allow an attacker to trigger unbounded memory allocation and potential denial-of-service. The flaw, tracked as CVE-2026-32288, is triggered when the reader processes a maliciously crafted archive containing an excessive number of sparse regions enc...

The Lab · 2026-04-17 20:22:51 · GitHub Issues

2. Moby spdystream v0.5.1 Patches Critical Memory Exhaustion Vulnerability (CVE-2026-35469)

A critical security flaw in the widely used `moby/spdystream` library exposes services to remote memory exhaustion attacks. The vulnerability, tracked as CVE-2026-35469, resides in the SPDY/3 frame parser, which fails to validate attacker-controlled input before allocating memory. This allows a remote peer to send a sm...

The Lab · 2026-04-26 20:54:09 · GitHub Issues

3. GitHub Runner Scaler Vulnerability: Unbounded Memory Growth via ETag State Accumulation

A memory exhaustion vulnerability has been identified in the KEDA GitHub Runner scaler, stemming from the absence of cache eviction logic for the enableEtags feature. The scaler maintains persistent state maps tracking etags, previousJobs, previousWfrs, and previousRepos, using repository names and constructed URLs as ...

The Lab · 2026-05-09 07:31:54 · Mastodon:mastodon.social:#infosec

4. CVE-2026-41311: LiquidJS Template Engine Vulnerability Enables Memory Exhaustion Attacks

A high-severity vulnerability tracked as CVE-2026-41311 has been disclosed in LiquidJS, a JavaScript template engine compatible with Shopify and GitHub Pages. Rated 7.5 on the CVSS scale, the flaw allows attackers to trigger an infinite recursive loop through maliciously crafted template code, consuming approximately 4...