Lucene search

K
amazonAmazonALAS-2024-2523
HistoryApr 24, 2024 - 10:15 p.m.

Important: nghttp2

2024-04-2422:15:00
alas.aws.amazon.com
17
nghttp2
vulnerability
cpu usage
update
security
http/2
c
library
cve-2024-28182
red hat
mitre
unix
package
frames
stream

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.4%

Issue Overview:

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability. (CVE-2024-28182)

Affected Packages:

nghttp2

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update nghttp2 to update your system.

New Packages:

aarch64:  
    nghttp2-1.41.0-1.amzn2.0.5.aarch64  
    libnghttp2-1.41.0-1.amzn2.0.5.aarch64  
    libnghttp2-devel-1.41.0-1.amzn2.0.5.aarch64  
    nghttp2-debuginfo-1.41.0-1.amzn2.0.5.aarch64  
  
i686:  
    nghttp2-1.41.0-1.amzn2.0.5.i686  
    libnghttp2-1.41.0-1.amzn2.0.5.i686  
    libnghttp2-devel-1.41.0-1.amzn2.0.5.i686  
    nghttp2-debuginfo-1.41.0-1.amzn2.0.5.i686  
  
src:  
    nghttp2-1.41.0-1.amzn2.0.5.src  
  
x86_64:  
    nghttp2-1.41.0-1.amzn2.0.5.x86_64  
    libnghttp2-1.41.0-1.amzn2.0.5.x86_64  
    libnghttp2-devel-1.41.0-1.amzn2.0.5.x86_64  
    nghttp2-debuginfo-1.41.0-1.amzn2.0.5.x86_64  

Additional References

Red Hat: CVE-2024-28182

Mitre: CVE-2024-28182

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.4%