CVE-2024-28182

NameCVE-2024-28182
Descriptionnghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3804-1, DLA-3898-1
Debian Bugs1068415

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nghttp2 (PTS)bullseye1.43.0-1+deb11u1vulnerable
bullseye (security)1.43.0-1+deb11u2fixed
bookworm, bookworm (security)1.52.0-1+deb12u1vulnerable
sid, trixie1.63.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nghttp2sourcebuster1.36.0-2+deb10u3DLA-3804-1
nghttp2sourcebullseye1.43.0-1+deb11u2DLA-3898-1
nghttp2source(unstable)1.61.0-11068415

Notes

[bookworm] - nghttp2 <no-dsa> (Minor issue)
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://www.kb.cert.org/vuls/id/421644
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0 (v1.61.0)
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9 (v1.61.0)

Search for package or bug name: Reporting problems