We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34161

NGINX HTTP/3 QUIC vulnerability



Assignerf5
Reserved2024-05-14
Published2024-05-29
Updated2024-08-02

Description

When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-416 Use After Free

Product status

Default status
unknown

1.25.0 before 1.26.1
affected

Default status
unknown

R30 before R32
affected

Credits

F5 0x4006e9ce90

References

https://my.f5.com/manage/s/article/K000139627 vendor-advisory

https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/

http://www.openwall.com/lists/oss-security/2024/05/30/4

https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/

cve.org CVE-2024-34161

nvd.nist.gov CVE-2024-34161

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.