First published: Wed May 29 2024(Updated: )
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
NGINX Plus | ||
NGINX Open Source | ||
Nginx | >=1.25.0<1.26.1 | |
Nginx | =r30 | |
Nginx | =r30-p1 | |
Nginx | =r30-p2 | |
Nginx | =r31 | |
Nginx | =r31-p1 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34161 is considered a memory leak vulnerability that can affect the stability of NGINX when configured with the HTTP/3 QUIC module.
To mitigate CVE-2024-34161, update NGINX Plus or NGINX OSS to the latest version that does not contain this vulnerability.
CVE-2024-34161 affects NGINX Plus r30 and r31, as well as NGINX OSS versions between 1.25.0 and 1.26.1 inclusive.
Failing to address CVE-2024-34161 may lead to increased memory usage and potential process crashes due to memory leaks.
While CVE-2024-34161 itself is a memory leak vulnerability, it can be exploited under specific conditions, potentially allowing for denial of service.