First published: Wed Feb 14 2024(Updated: )
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | =31=30 | 31 |
Nginx | >=1.25.0<=1.25.3 | 1.25.4 |
Nginx | >=1.25.0<1.25.4 | |
Nginx | =r30 | |
Nginx | =r30-p1 | |
Nginx | =r31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24990 is classified as a vulnerability that can lead to the termination of NGINX worker processes.
To mitigate CVE-2024-24990, ensure the HTTP/3 QUIC module is disabled in your NGINX configuration.
CVE-2024-24990 affects NGINX Plus versions 30 and 31, and NGINX Open Source versions from 1.25.0 to 1.25.3.
No, the HTTP/3 QUIC module is not enabled by default in NGINX and is considered experimental.
Undisclosed requests within the HTTP/3 QUIC module configuration can lead to the termination of NGINX worker processes.