CVE-2024-28182

NameCVE-2024-28182
Descriptionnghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3804-1, DLA-3898-1, ELA-1104-1
Debian Bugs1068415

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nghttp2 (PTS)jessie, jessie (lts)0.6.4-2+deb8u1vulnerable
stretch (security)1.18.1-1+deb9u2vulnerable
stretch (lts), stretch1.18.1-1+deb9u4fixed
buster (security), buster, buster (lts)1.36.0-2+deb10u3fixed
bullseye1.43.0-1+deb11u1vulnerable
bullseye (security)1.43.0-1+deb11u2fixed
bookworm1.52.0-1+deb12u2fixed
bookworm (security)1.52.0-1+deb12u1vulnerable
sid, trixie1.64.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nghttp2sourcestretch1.18.1-1+deb9u4ELA-1104-1
nghttp2sourcebuster1.36.0-2+deb10u3DLA-3804-1
nghttp2sourcebullseye1.43.0-1+deb11u2DLA-3898-1
nghttp2sourcebookworm1.52.0-1+deb12u2
nghttp2source(unstable)1.61.0-11068415

Notes

https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://www.kb.cert.org/vuls/id/421644
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0 (v1.61.0)
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9 (v1.61.0)

Search for package or bug name: Reporting problems