First published: Fri Mar 08 2024(Updated: )
Last updated 24 July 2024
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nghttp2 | <1.61.0 | 1.61.0 |
debian/nghttp2 | <=1.43.0-1+deb11u1<=1.52.0-1+deb12u1 | 1.43.0-1+deb11u2 1.52.0-1+deb12u2 1.64.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28182 has been classified as a moderate severity vulnerability due to its potential impact on application performance.
To fix CVE-2024-28182, you should upgrade nghttp2 to version 1.61.0 or later.
The nghttp2 library versions prior to 1.61.0 are affected by CVE-2024-28182.
CVE-2024-28182 involves an unbounded reading of HTTP/2 CONTINUATION frames which can lead to unnecessary memory usage.
Exploitation of CVE-2024-28182 can result in performance degradation due to excessive memory consumption.