CVE Vulnerabilities

CVE-2024-22019

Improper Resource Shutdown or Release

Published: Feb 20, 2024 | Modified: Nov 05, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
HIGH

A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat nodejs:16-8090020240315081818.a75119d5 *
Red Hat Enterprise Linux 8 RedHat nodejs:18-8090020240301110609.a75119d5 *
Red Hat Enterprise Linux 8 RedHat nodejs:20-8090020240228165436.a75119d5 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat nodejs:16-8060020240318185600.ad008a3a *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat nodejs:18-8080020240322102042.63b34585 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat nodejs:16-8080020240318185426.63b34585 *
Red Hat Enterprise Linux 9 RedHat nodejs-1:16.20.2-4.el9_3 *
Red Hat Enterprise Linux 9 RedHat nodejs:18-9030020240301111035.rhel9 *
Red Hat Enterprise Linux 9 RedHat nodejs:20-9030020240229115828.rhel9 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat nodejs-1:16.20.2-4.el9_0 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat nodejs-1:16.20.2-4.el9_2 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat nodejs:18-9020020240322155241.rhel9 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-nodejs14-nodejs-0:14.21.3-6.el7 *
Nodejs Ubuntu bionic *
Nodejs Ubuntu mantic *
Nodejs Ubuntu trusty *
Nodejs Ubuntu upstream *
Nodejs Ubuntu xenial *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References