We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34161

NGINX HTTP/3 QUIC vulnerability



Description

When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.

Reserved 2024-05-14 | Published 2024-05-29 | Updated 2025-02-13 | Assigner f5


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-416 Use After Free

Product status

Default status
unknown

1.25.0 before 1.26.1
affected

Default status
unknown

R30 before R32
affected

Credits

F5 finder

References

my.f5.com/manage/s/article/K000139627 vendor-advisory

lists.fedoraproject.org/...R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/

www.openwall.com/lists/oss-security/2024/05/30/4

lists.fedoraproject.org/...MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/

cve.org (CVE-2024-34161)

nvd.nist.gov (CVE-2024-34161)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-34161

Support options

Helpdesk Chat, Email, Knowledgebase