Security Advisories์ถœ์ฒ˜: GitHub Security Advisories์กฐํšŒ์ˆ˜ 7

[devalue] devalue affected by CPU and memory amplification from sparse arrays

By GitHub
2026๋…„ 2์›” 20์ผ
**[devalue] devalue affected by CPU and memory amplification from sparse arrays**

Under certain circumstances, serializing sparse arrays using uneval or stringify could cause CPU and/or memory exhaustion. When this occurs on the server, it results in a DoS. This is extremely difficult to take advantage of in practice, as an attacker would have to manage to create a sparse array on the server โ€” which is impossible in every mainstream wire format โ€” and then that sparse array would have to be run through uneval or stringify. References https://github.com/sveltejs/devalue/security/advisories/GHSA-33hq-fvwr-56pm https://github.com/sveltejs/devalue/commit/819f1ac7475ab37547645cfb09bf2f678a799cf0 https://github.com/sveltejs/devalue/releases/tag/v5.6.3 https://github.com/advisories/GHSA-33hq-fvwr-56pm

---

**[devsupporter ํ•ด์„ค]**

์ด ๊ธฐ์‚ฌ๋Š” GitHub Security Advisories์—์„œ ์ œ๊ณตํ•˜๋Š” ์ตœ์‹  ๊ฐœ๋ฐœ ๋™ํ–ฅ์ž…๋‹ˆ๋‹ค. ๊ด€๋ จ ๋„๊ตฌ๋‚˜ ๊ธฐ์ˆ ์— ๋Œ€ํ•ด ๋” ์•Œ์•„๋ณด์‹œ๋ ค๋ฉด ์›๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ•˜์„ธ์š”.