
CVE-2024-34161 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-34161
29 May 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory. Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC y la infraestructura de red admite una unidad de transmisión máxima (MTU) de 4096 o más sin fragmentación, los paquetes QUIC no revelados pueden hacer... • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-416: Use After Free •

CVE-2024-35200 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-35200
29 May 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate. Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solicitudes HTTP/3 no reveladas pueden hacer que los procesos de trabajo de NGINX finalicen. • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-476: NULL Pointer Dereference •

CVE-2024-32760 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-32760
29 May 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact. Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las instrucciones del codificador HTTP/3 no divulgadas pueden hacer que los procesos de trabajo de NGINX finalicen o causen otro impacto potencial. • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-787: Out-of-bounds Write •

CVE-2024-31079 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-31079
29 May 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over. Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solicitudes HTTP/3 no divulgadas pueden hacer que los procesos de trabajo de NGIN... • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-24990 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-24990
14 Feb 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solici... • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-416: Use After Free •

CVE-2024-24989 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-24989
14 Feb 2024 — When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solici... • http://www.openwall.com/lists/oss-security/2024/05/30/4 • CWE-476: NULL Pointer Dereference •