When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate.
Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html .
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
Fri, 24 Jan 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 nginx Open Source F5 nginx Plus |
|
CPEs | cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:* |
|
Vendors & Products |
F5
F5 nginx Open Source F5 nginx Plus |

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-02-13T17:40:43.783Z
Reserved: 2024-02-02T00:32:55.375Z
Link: CVE-2024-24990

No data.

Status : Modified
Published: 2024-02-14T17:15:15.713
Modified: 2025-02-13T18:17:12.990
Link: CVE-2024-24990
