USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS.
Original advisory details:
It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513)
It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487)
It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "libnghttp2-14" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "libnghttp2-14-dbgsym" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "libnghttp2-dev" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "libnghttp2-doc" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-client" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-client-dbgsym" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-proxy" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-proxy-dbgsym" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-server" }, { "binary_version": "1.59.0-1ubuntu0.1", "binary_name": "nghttp2-server-dbgsym" } ] }