Описание
ELSA-2024-1438: nodejs security update (IMPORTANT)
[1:16.20.2-4.0.1]
- reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks Resolves: CVE-2024-22019
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
nodejs
16.20.2-4.0.1.el9_3
nodejs-docs
16.20.2-4.0.1.el9_3
nodejs-full-i18n
16.20.2-4.0.1.el9_3
nodejs-libs
16.20.2-4.0.1.el9_3
npm
8.19.4-1.16.20.2.4.0.1.el9_3
Oracle Linux x86_64
nodejs
16.20.2-4.0.1.el9_3
nodejs-docs
16.20.2-4.0.1.el9_3
nodejs-full-i18n
16.20.2-4.0.1.el9_3
nodejs-libs
16.20.2-4.0.1.el9_3
npm
8.19.4-1.16.20.2.4.0.1.el9_3
Связанные CVE
Связанные уязвимости
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
A vulnerability in Node.js HTTP servers allows an attacker to send a s ...