Vulnerability Description
Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://github.com/nodejs/undici/commit/f979ec3204ca489abf30e7d20e9fee9ea7711d36
- https://github.com/nodejs/undici/issues/3328
- https://github.com/nodejs/undici/issues/3337
- https://github.com/nodejs/undici/pull/3338
- https://github.com/nodejs/undici/security/advisories/GHSA-3g92-w8c5-73pq
- https://github.com/nodejs/undici/commit/f979ec3204ca489abf30e7d20e9fee9ea7711d36
- https://github.com/nodejs/undici/issues/3328
- https://github.com/nodejs/undici/issues/3337
- https://github.com/nodejs/undici/pull/3338
- https://github.com/nodejs/undici/security/advisories/GHSA-3g92-w8c5-73pq
- https://security.netapp.com/advisory/ntap-20240828-0009/
FAQ
What is CVE-2024-38372?
CVE-2024-38372 is a vulnerability with a CVSS score of 2.0 (LOW). Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the No...
How severe is CVE-2024-38372?
CVE-2024-38372 has been rated LOW with a CVSS base score of 2.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-38372?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.