Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-22025

Published: February 16, 2024Last modified: May 22, 2024

Description

A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.

Severity score breakdown

ParameterValue
Base score6.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSnodejsFixed (18.19.1-r0)
StreamnodejsFixed (20.11.1-r0)
Liberica NIK23 (JDK 17)standard (nodejs)Fixed (23.0.4+1)
23 (JDK 21)standard (nodejs)Fixed (23.1.3+2)
24 (JDK 22)nodejsFixed (24.0.1+1)

References

Published BELL-SAs

ON THIS PAGE