Resource Exhaustion Affecting nodejs-full-i18n package, versions <1:16.20.2-6.el9_0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-NODEJSFULLI18N-7198666
- published 4 Jun 2024
- disclosed 3 Apr 2024
Introduced: 3 Apr 2024
CVE-2024-27983 Open this link in a new tabHow to fix?
Upgrade RHEL:9 nodejs-full-i18n to version 1:16.20.2-6.el9_0 or higher.
This issue was patched in RHSA-2024:3545.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nodejs-full-i18n package and not the nodejs-full-i18n package as distributed by RHEL.
See How to fix? for RHEL:9 relevant fixed versions and status.
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
References
- https://access.redhat.com/security/cve/CVE-2024-27983
- https://hackerone.com/reports/2319584
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
- http://www.openwall.com/lists/oss-security/2024/04/03/16
- https://security.netapp.com/advisory/ntap-20240510-0002/