First published: Tue Apr 02 2024(Updated: )
At a minimum, the following versions of Node.js are affected 18, 20, and 21. Description: An attacker can make the Node.js HTTP/2 server unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js | >=18>=20>=21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2272764 is high due to its potential to make the Node.js HTTP/2 server unavailable.
To fix REDHAT-BUG-2272764, upgrade to a patched version of Node.js that addresses the vulnerability.
Versions 18, 20, and 21 of Node.js are affected by REDHAT-BUG-2272764.
REDHAT-BUG-2272764 involves an attacker being able to disrupt the Node.js HTTP/2 server by sending crafted HTTP/2 frames.
There is no official workaround for REDHAT-BUG-2272764, and upgrading to a secure version is recommended.