CVE Vulnerabilities

CVE-2024-22019

Improper Resource Shutdown or Release

Published: Feb 20, 2024 | Modified: Nov 04, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
Node.jsNodejs18.0.0 (including)18.19.1 (excluding)
Node.jsNodejs20.0.0 (including)20.11.1 (excluding)
Node.jsNodejs21.0.0 (including)21.6.2 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:16-8090020240315081818.a75119d5*
Red Hat Enterprise Linux 8RedHatnodejs:18-8090020240301110609.a75119d5*
Red Hat Enterprise Linux 8RedHatnodejs:20-8090020240228165436.a75119d5*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatnodejs:16-8060020240318185600.ad008a3a*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatnodejs:18-8080020240322102042.63b34585*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatnodejs:16-8080020240318185426.63b34585*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.20.2-4.el9_3*
Red Hat Enterprise Linux 9RedHatnodejs:18-9030020240301111035.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs:20-9030020240229115828.rhel9*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.20.2-4.el9_0*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnodejs-1:16.20.2-4.el9_2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnodejs:18-9020020240322155241.rhel9*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs14-nodejs-0:14.21.3-6.el7*
NodejsUbuntubionic*
NodejsUbuntumantic*
NodejsUbuntutrusty*
NodejsUbuntuupstream*
NodejsUbuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References