Bug 2264728 (CVE-2024-24750)

Summary: CVE-2024-24750 undici: memory leak
Product: [Other] Security Response Reporter: ybuenos
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abarbaro, abrianik, amctagga, ggrzybek, gkamathe, jchui, jhe, ktsao, manissin, nboldt, owatkins, parichar, psrna, rtaniwa, sdawley, tasato, tkral
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: undici 6.6.1 Doc Type: ---
Doc Text:
An uncontrolled resource consumption flaw was found in undici. Calling `fetch(url)` and not consuming the incoming body or consuming it very slowly leads to a memory leak.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2264729    

Description ybuenos 2024-02-18 11:35:17 UTC
Undici is an HTTP/1.1 client, written from scratch for Node.js. In affected versions calling `fetch(url)` and not consuming the incoming body ((or consuming it very slowing) will lead to a memory leak. This issue has been addressed in version 6.6.1. Users are advised to upgrade. Users unable to upgrade should make sure to always consume the incoming body.

https://github.com/nodejs/undici/commit/87a48113f1f68f60aa09abb07276d7c35467c663
https://github.com/nodejs/undici/security/advisories/GHSA-9f24-jqhm-jfcw