{"id":"CVE-2024-28182","summary":"Reading unbounded number of HTTP/2 CONTINUATION frames to cause excessive CPU usage","details":"nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.","aliases":["GHSA-x6x3-gv8h-m57q"],"modified":"2026-04-16T04:32:57.228338750Z","published":"2024-04-04T14:41:36.587Z","related":["ALSA-2024:2778","ALSA-2024:2779","ALSA-2024:2780","ALSA-2024:2853","ALSA-2024:2910","ALSA-2024:3501","ALSA-2024:4252","CGA-rvm7-6r3p-7h9c","SUSE-SU-2024:1156-1","SUSE-SU-2024:1167-1","SUSE-SU-2024:1167-2","SUSE-SU-2025:20002-1","openSUSE-SU-2024:13825-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28182.json","cwe_ids":["CWE-770"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/04/03/16"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00041.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/"},{"type":"WEB","url":"https://www.kb.cert.org/vuls/id/421644"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28182.json"},{"type":"ADVISORY","url":"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28182"},{"type":"FIX","url":"https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0"},{"type":"FIX","url":"https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nghttp2/nghttp2","events":[{"introduced":"0"},{"fixed":"d76b8331d16200df3d969d94438a96495ffbe42b"}]}],"versions":["v0.2.0","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.7.0","v0.7.1","v0.7.10","v0.7.11","v0.7.12","v0.7.13","v0.7.14","v0.7.15","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.7.8","v0.7.9","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.1.0","v1.1.1","v1.1.2","v1.10.0","v1.11.0","v1.12.0","v1.13.0","v1.14.0","v1.15.0","v1.16.0","v1.17.0","v1.18.0","v1.19.0","v1.2.0","v1.2.1","v1.20.0","v1.21.0","v1.22.0","v1.23.0","v1.24.0","v1.25.0","v1.26.0","v1.27.0","v1.28.0","v1.29.0","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.30.0","v1.31.0","v1.32.0","v1.33.0","v1.34.0","v1.35.0","v1.36.0","v1.37.0","v1.38.0","v1.39.0","v1.4.0","v1.40.0","v1.41.0","v1.42.0","v1.43.0","v1.44.0","v1.45.0","v1.46.0","v1.47.0","v1.48.0","v1.49.0","v1.5.0","v1.50.0","v1.51.0","v1.52.0","v1.53.0","v1.54.0","v1.55.0","v1.56.0","v1.57.0","v1.58.0","v1.59.0","v1.6.0","v1.60.0","v1.7.0","v1.8.0","v1.9.0","v1.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28182.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/tatsuhiro-t/nghttp2","events":[{"introduced":"0"},{"fixed":"d76b8331d16200df3d969d94438a96495ffbe42b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.61.0"}]}}],"versions":["v0.2.0","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.7.0","v0.7.1","v0.7.10","v0.7.11","v0.7.12","v0.7.13","v0.7.14","v0.7.15","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.7.8","v0.7.9","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.1.0","v1.1.1","v1.1.2","v1.10.0","v1.11.0","v1.12.0","v1.13.0","v1.14.0","v1.15.0","v1.16.0","v1.17.0","v1.18.0","v1.19.0","v1.2.0","v1.2.1","v1.20.0","v1.21.0","v1.22.0","v1.23.0","v1.24.0","v1.25.0","v1.26.0","v1.27.0","v1.28.0","v1.29.0","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.30.0","v1.31.0","v1.32.0","v1.33.0","v1.34.0","v1.35.0","v1.36.0","v1.37.0","v1.38.0","v1.39.0","v1.4.0","v1.40.0","v1.41.0","v1.42.0","v1.43.0","v1.44.0","v1.45.0","v1.46.0","v1.47.0","v1.48.0","v1.49.0","v1.5.0","v1.50.0","v1.51.0","v1.52.0","v1.53.0","v1.54.0","v1.55.0","v1.56.0","v1.57.0","v1.58.0","v1.59.0","v1.6.0","v1.60.0","v1.7.0","v1.8.0","v1.9.0","v1.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28182.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}