Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2024-28182
Description:nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2024.1968   1.3.6.1.4.1.25623.1.0.856063   1.3.6.1.4.1.25623.1.1.2.2024.2043   1.3.6.1.4.1.25623.1.1.2.2024.2171   1.3.6.1.4.1.25623.1.0.886660   1.3.6.1.4.1.25623.1.0.114474   1.3.6.1.4.1.25623.1.0.886693   1.3.6.1.4.1.25623.1.1.4.2024.1156.1   1.3.6.1.4.1.25623.1.1.2.2024.2144   1.3.6.1.4.1.25623.1.1.2.2024.2312   1.3.6.1.4.1.25623.1.1.2.2024.2673   1.3.6.1.4.1.25623.1.1.13.2024.095.02   1.3.6.1.4.1.25623.1.1.2.2024.2245   1.3.6.1.4.1.25623.1.1.2.2024.2481   1.3.6.1.4.1.25623.1.1.1.2.2024.3804   1.3.6.1.4.1.25623.1.1.2.2024.2639   1.3.6.1.4.1.25623.1.1.2.2024.2197   1.3.6.1.4.1.25623.1.1.2.2024.2332   1.3.6.1.4.1.25623.1.0.886709   1.3.6.1.4.1.25623.1.1.10.2024.0135   1.3.6.1.4.1.25623.1.1.2.2024.2124   1.3.6.1.4.1.25623.1.1.2.2024.1892   1.3.6.1.4.1.25623.1.1.2.2024.1820   1.3.6.1.4.1.25623.1.1.2.2024.1841   1.3.6.1.4.1.25623.1.1.12.2024.6754.2   1.3.6.1.4.1.25623.1.1.2.2024.2221   1.3.6.1.4.1.25623.1.1.2.2024.1941   1.3.6.1.4.1.25623.1.1.1.2.2024.3898   1.3.6.1.4.1.25623.1.1.2.2024.1916   1.3.6.1.4.1.25623.1.1.4.2024.1167.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2024-28182
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html
http://www.openwall.com/lists/oss-security/2024/04/03/16




© 1998-2025 E-Soft Inc. All rights reserved.