Skip to content

Commit 4a8a4dd

Browse files
Update apps/site/pages/en/blog/vulnerability/january-2026-dos-mitigation-async-hooks.md
Co-authored-by: Joyee Cheung <joyeec9h3@gmail.com> Signed-off-by: Matteo Collina <matteo.collina@gmail.com>
1 parent 39c6d24 commit 4a8a4dd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

apps/site/pages/en/blog/vulnerability/january-2026-dos-mitigation-async-hooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Due to the prevalence of this usage pattern in frameworks, including but not lim
2222

2323
The bug fix is included in a security release because of its widespread impact on the ecosystem. However, this is only a mitigation for the general risk that lies in the ecosystem’s dependence on recoverable stack space exhaustion for service availability.
2424

25-
For users of these frameworks/tools and server hosting providers: Update as soon as possible.
25+
**For users of these frameworks/tools and server hosting providers**: Update as soon as possible.
2626

2727
For libraries and frameworks: apply a more robust defense against stack space exhaustion to ensure service availability (e.g., limit recursion depth or avoid recursions if the depth can be controlled by an attacker). A recoverable `RangeError: Maximum call stack size exceeded` is only an unspecified behavior implemented on a best-effort basis, and cannot be depended on for security guarantees.
2828

0 commit comments

Comments
 (0)