CVE-2024-24750

NameCVE-2024-24750
DescriptionUndici is an HTTP/1.1 client, written from scratch for Node.js. In affected versions calling `fetch(url)` and not consuming the incoming body ((or consuming it very slowing) will lead to a memory leak. This issue has been addressed in version 6.6.1. Users are advised to upgrade. Users unable to upgrade should make sure to always consume the incoming body.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-undici (PTS)bookworm (security), bookworm5.15.0+dfsg1+~cs20.10.9.3-1+deb12u3fixed
sid, trixie5.28.4+dfsg1+~cs23.12.11-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-undicisource(unstable)(not affected)

Notes

- node-undici <not-affected> (Vulnerable code not present)
https://github.com/nodejs/undici/security/advisories/GHSA-9f24-jqhm-jfcw
https://github.com/nodejs/undici/commit/87a48113f1f68f60aa09abb07276d7c35467c663 (v6.6.1)

Search for package or bug name: Reporting problems