CVE-2024-24990

When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*

History

24 Jan 2025, 16:01

Type Values Removed Values Added
CPE cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
First Time F5 nginx Open Source
F5
F5 nginx Plus
References () http://www.openwall.com/lists/oss-security/2024/05/30/4 - () http://www.openwall.com/lists/oss-security/2024/05/30/4 - Mailing List
References () https://my.f5.com/manage/s/article/K000138445 - () https://my.f5.com/manage/s/article/K000138445 - Vendor Advisory

21 Nov 2024, 09:00

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/05/30/4 - () http://www.openwall.com/lists/oss-security/2024/05/30/4 -
References () https://my.f5.com/manage/s/article/K000138445 - () https://my.f5.com/manage/s/article/K000138445 -

10 Jun 2024, 17:16

Type Values Removed Values Added
Summary
  • (es) Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solicitudes no divulgadas pueden hacer que los procesos de trabajo de NGINX finalicen. Nota: El módulo HTTP/3 QUIC no está habilitado de forma predeterminada y se considera experimental. Para obtener más información, consulte Compatibilidad con QUIC y HTTP/3 https://nginx.org/en/docs/quic.html. Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan
References
  • () http://www.openwall.com/lists/oss-security/2024/05/30/4 -

14 Feb 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-14 17:15

Updated : 2025-01-24 16:01


NVD link : CVE-2024-24990

Mitre link : CVE-2024-24990

CVE.ORG link : CVE-2024-24990


JSON object : View

Products Affected

f5

  • nginx_open_source
  • nginx_plus
CWE
CWE-416

Use After Free