CVE Vulnerabilities

CVE-2022-1289

Improper Resource Shutdown or Release

Published: Apr 10, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
FurnaceTildearrow- (including)- (including)
FurnaceTildearrow0.2 (including)0.2 (including)
FurnaceTildearrow0.2.1 (including)0.2.1 (including)
FurnaceTildearrow0.2.2 (including)0.2.2 (including)
FurnaceTildearrow0.3 (including)0.3 (including)
FurnaceTildearrow0.3.1 (including)0.3.1 (including)
FurnaceTildearrow0.4 (including)0.4 (including)
FurnaceTildearrow0.4.1 (including)0.4.1 (including)
FurnaceTildearrow0.4.2 (including)0.4.2 (including)
FurnaceTildearrow0.4.3 (including)0.4.3 (including)
FurnaceTildearrow0.4.4 (including)0.4.4 (including)
FurnaceTildearrow0.4.5 (including)0.4.5 (including)
FurnaceTildearrow0.4.5-real (including)0.4.5-real (including)
FurnaceTildearrow0.4.6 (including)0.4.6 (including)
FurnaceTildearrow0.4.7 (including)0.4.7 (including)
FurnaceTildearrow0.5 (including)0.5 (including)
FurnaceTildearrow0.5.1 (including)0.5.1 (including)
FurnaceTildearrow0.5.2 (including)0.5.2 (including)
FurnaceTildearrow0.5.3 (including)0.5.3 (including)
FurnaceTildearrow0.5.4 (including)0.5.4 (including)
FurnaceTildearrow0.5.5 (including)0.5.5 (including)
FurnaceTildearrow0.5.6 (including)0.5.6 (including)
FurnaceTildearrow0.5.7 (including)0.5.7 (including)
FurnaceTildearrow0.5.7-pre4 (including)0.5.7-pre4 (including)
FurnaceTildearrow0.5.8 (including)0.5.8 (including)
FurnaceTildearrow0.6-pre0 (including)0.6-pre0 (including)
FurnaceTildearrowdev5 (including)dev5 (including)
FurnaceTildearrowdev6 (including)dev6 (including)
FurnaceTildearrowdev7 (including)dev7 (including)
FurnaceTildearrowdev8 (including)dev8 (including)
FurnaceTildearrowdev9 (including)dev9 (including)
FurnaceTildearrowdev10 (including)dev10 (including)
FurnaceTildearrowdev62 (including)dev62 (including)
FurnaceTildearrowdev63 (including)dev63 (including)
FurnaceTildearrowdev64 (including)dev64 (including)
FurnaceTildearrowdev65 (including)dev65 (including)
FurnaceTildearrowdev66 (including)dev66 (including)
FurnaceTildearrowdev67 (including)dev67 (including)
FurnaceTildearrowdev68 (including)dev68 (including)
FurnaceTildearrowdev69 (including)dev69 (including)
FurnaceTildearrowdev70 (including)dev70 (including)
FurnaceTildearrowdev71 (including)dev71 (including)
FurnaceTildearrowdev72 (including)dev72 (including)
FurnaceTildearrowdev73 (including)dev73 (including)
FurnaceTildearrowdev75 (including)dev75 (including)
FurnaceTildearrowdev76 (including)dev76 (including)
FurnaceTildearrowdev77 (including)dev77 (including)
FurnaceTildearrowdev78 (including)dev78 (including)
FurnaceTildearrowdev79 (including)dev79 (including)
FurnaceTildearrowdev80 (including)dev80 (including)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References