Bug 2342618 (CVE-2025-23085)
Summary: | CVE-2025-23085 nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | caswilli, kaycoth |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in NodeJS when handling HTTP/2 connections, where the remote peer abruptly closes the socket without sending the proper HTTP/2 notification to the server, leading to a memory leak. This flaw allows an attacker to force the targeted process in the targeted host to an uncontrollable resource consumption state, starving the process and possibly other processes running at the same host to memory starvation, leading to a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2025-01-28 17:26:48 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:1351 https://access.redhat.com/errata/RHSA-2025:1351 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:1443 https://access.redhat.com/errata/RHSA-2025:1443 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:1446 https://access.redhat.com/errata/RHSA-2025:1446 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:1582 https://access.redhat.com/errata/RHSA-2025:1582 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:1611 https://access.redhat.com/errata/RHSA-2025:1611 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:1613 https://access.redhat.com/errata/RHSA-2025:1613 |