Bug 2335479 (CVE-2024-56332)
Summary: | CVE-2024-56332 next.js: Next.js Vulnerable to Denial of Service (DoS) with Server Actions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bkabrda, caswilli, chazlett, chfoley, gotiwari, jhorak, jscholz, kaycoth, lball, mlichvar, mvyas, ngough, swoodman, tpopela, veshanka |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Next.js package. A denial of service (DoS) attack allows attackers to construct requests that leave requests to Server Actions hanging until the hosting provider cancels the function execution. The Next.js server is idle during that time and only keeps the connection open. The CPU and memory footprint are low during that time. This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. This vulnerability is novel if the host has no other mitigations for those.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2025-01-06 10:17:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2335760, 2335748, 2335749, 2335750, 2335751, 2335752, 2335753, 2335754, 2335755, 2335756, 2335757, 2335758, 2335759, 2335761 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-01-03 21:01:05 UTC
The conky upstream tarball includes the source code of the upstream website, which seems to be using next.js, but that is not included in the rpms we build for Fedora. I closed the wrong bug. Sorry for the noise. |