CVE-2024-22025

Updated: 2025-08-20 02:31:17.954498

Description:

A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x MEDIUM 6.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 10 nodejs 16 6.5 MEDIUM Released CLSA-2025:1765905087 2025-12-16 17:16:08
Debian 10 nodejs 20 6.5 MEDIUM Already Fixed 2025-12-12 16:05:36
Debian 10 nodejs 18 6.5 MEDIUM Already Fixed 2025-12-12 16:05:36
Debian 10 nodejs 14 6.5 MEDIUM Released CLSA-2025:1765908822 2025-12-16 19:52:11
Debian 10 nodejs 12 6.5 MEDIUM Released CLSA-2025:1765975221 2025-12-17 15:01:54
Debian 11 nodejs 18 6.5 MEDIUM Already Fixed 2025-12-12 16:05:35
Debian 11 nodejs 16 6.5 MEDIUM Released CLSA-2025:1765905451 2025-12-16 19:52:52
Debian 11 nodejs 20 6.5 MEDIUM Already Fixed 2025-12-12 16:05:35
Debian 11 nodejs 12 6.5 MEDIUM Released CLSA-2025:1765977098 2025-12-17 15:01:52
Debian 11 nodejs 14 6.5 MEDIUM Released CLSA-2025:1765908963 2025-12-16 19:52:09
Total: 55