CVE Vulnerabilities

CVE-2022-1289

Improper Resource Shutdown or Release

Published: Apr 10, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu

A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Furnace Tildearrow - (including) - (including)
Furnace Tildearrow 0.2 (including) 0.2 (including)
Furnace Tildearrow 0.2.1 (including) 0.2.1 (including)
Furnace Tildearrow 0.2.2 (including) 0.2.2 (including)
Furnace Tildearrow 0.3 (including) 0.3 (including)
Furnace Tildearrow 0.3.1 (including) 0.3.1 (including)
Furnace Tildearrow 0.4 (including) 0.4 (including)
Furnace Tildearrow 0.4.1 (including) 0.4.1 (including)
Furnace Tildearrow 0.4.2 (including) 0.4.2 (including)
Furnace Tildearrow 0.4.3 (including) 0.4.3 (including)
Furnace Tildearrow 0.4.4 (including) 0.4.4 (including)
Furnace Tildearrow 0.4.5 (including) 0.4.5 (including)
Furnace Tildearrow 0.4.5-real (including) 0.4.5-real (including)
Furnace Tildearrow 0.4.6 (including) 0.4.6 (including)
Furnace Tildearrow 0.4.7 (including) 0.4.7 (including)
Furnace Tildearrow 0.5 (including) 0.5 (including)
Furnace Tildearrow 0.5.1 (including) 0.5.1 (including)
Furnace Tildearrow 0.5.2 (including) 0.5.2 (including)
Furnace Tildearrow 0.5.3 (including) 0.5.3 (including)
Furnace Tildearrow 0.5.4 (including) 0.5.4 (including)
Furnace Tildearrow 0.5.5 (including) 0.5.5 (including)
Furnace Tildearrow 0.5.6 (including) 0.5.6 (including)
Furnace Tildearrow 0.5.7 (including) 0.5.7 (including)
Furnace Tildearrow 0.5.7-pre4 (including) 0.5.7-pre4 (including)
Furnace Tildearrow 0.5.8 (including) 0.5.8 (including)
Furnace Tildearrow 0.6-pre0 (including) 0.6-pre0 (including)
Furnace Tildearrow dev5 (including) dev5 (including)
Furnace Tildearrow dev6 (including) dev6 (including)
Furnace Tildearrow dev7 (including) dev7 (including)
Furnace Tildearrow dev8 (including) dev8 (including)
Furnace Tildearrow dev9 (including) dev9 (including)
Furnace Tildearrow dev10 (including) dev10 (including)
Furnace Tildearrow dev62 (including) dev62 (including)
Furnace Tildearrow dev63 (including) dev63 (including)
Furnace Tildearrow dev64 (including) dev64 (including)
Furnace Tildearrow dev65 (including) dev65 (including)
Furnace Tildearrow dev66 (including) dev66 (including)
Furnace Tildearrow dev67 (including) dev67 (including)
Furnace Tildearrow dev68 (including) dev68 (including)
Furnace Tildearrow dev69 (including) dev69 (including)
Furnace Tildearrow dev70 (including) dev70 (including)
Furnace Tildearrow dev71 (including) dev71 (including)
Furnace Tildearrow dev72 (including) dev72 (including)
Furnace Tildearrow dev73 (including) dev73 (including)
Furnace Tildearrow dev75 (including) dev75 (including)
Furnace Tildearrow dev76 (including) dev76 (including)
Furnace Tildearrow dev77 (including) dev77 (including)
Furnace Tildearrow dev78 (including) dev78 (including)
Furnace Tildearrow dev79 (including) dev79 (including)
Furnace Tildearrow dev80 (including) dev80 (including)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References