CVE Vulnerabilities

CVE-2024-22025

Improper Resource Shutdown or Release

Published: Mar 19, 2024 | Modified: Oct 30, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat nodejs:20-8090020240422150739.a75119d5 *
Red Hat Enterprise Linux 8 RedHat nodejs:18-8090020240429131734.a75119d5 *
Red Hat Enterprise Linux 9 RedHat nodejs:18-9040020240422140329.rhel9 *
Red Hat Enterprise Linux 9 RedHat nodejs:20-9040020240419140200.rhel9 *
Red Hat Enterprise Linux 9 RedHat nodejs-1:16.20.2-8.el9_4 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat nodejs-1:16.20.2-9.el9_0 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat nodejs-1:16.20.2-6.el9_2.3 *
Nodejs Ubuntu bionic *
Nodejs Ubuntu mantic *
Nodejs Ubuntu trusty *
Nodejs Ubuntu trusty/esm *
Nodejs Ubuntu upstream *
Nodejs Ubuntu xenial *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References