Search for packages
Package details: pkg:deb/debian/nghttp2@0.6.4-2~bpo70%2B1
purl pkg:deb/debian/nghttp2@0.6.4-2~bpo70%2B1
Next non-vulnerable version 1.52.0-1+deb12u2
Latest non-vulnerable version 1.52.0-1+deb12u2
Risk 10.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-9nfh-cgh8-ykam
Aliases:
CVE-2019-9511
Excessive CPU usage in HTTP/2 with small window updates
1.18.1-1+deb9u1
Affected by 6 other vulnerabilities.
1.36.0-2+deb10u1
Affected by 5 other vulnerabilities.
1.43.0-1+deb11u1
Affected by 1 other vulnerability.
VCID-b1ek-99j3-xug4
Aliases:
CVE-2016-1544
nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
1.18.1-1+deb9u1
Affected by 6 other vulnerabilities.
VCID-c9nm-3ngj-ffch
Aliases:
CVE-2018-1000168
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
1.36.0-2+deb10u1
Affected by 5 other vulnerabilities.
VCID-exby-4w2g-kbbp
Aliases:
CVE-2015-8659
1.18.1-1+deb9u1
Affected by 6 other vulnerabilities.
VCID-k39t-1zme-9kc9
Aliases:
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
1.43.0-1+deb11u1
Affected by 1 other vulnerability.
VCID-w5uu-nj7c-wka6
Aliases:
CVE-2023-44487
GHSA-qppj-fm5r-hxr3
VSV00013
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
1.43.0-1+deb11u1
Affected by 1 other vulnerability.
VCID-wvtc-3qza-afgh
Aliases:
CVE-2019-9513
Excessive CPU usage in HTTP/2 with priority changes
1.18.1-1+deb9u1
Affected by 6 other vulnerabilities.
1.36.0-2+deb10u1
Affected by 5 other vulnerabilities.
1.43.0-1+deb11u1
Affected by 1 other vulnerability.
VCID-yxm9-ukxx-j7bd
Aliases:
CVE-2024-28182
nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
1.52.0-1+deb12u2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T17:42:57.406147+00:00 Debian Oval Importer Affected by VCID-yxm9-ukxx-j7bd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:52:22.792493+00:00 Debian Oval Importer Affected by VCID-w5uu-nj7c-wka6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:19:15.511905+00:00 Debian Oval Importer Affected by VCID-exby-4w2g-kbbp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:58:09.269679+00:00 Debian Oval Importer Affected by VCID-wvtc-3qza-afgh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:23:31.361430+00:00 Debian Oval Importer Affected by VCID-b1ek-99j3-xug4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:02:27.687304+00:00 Debian Oval Importer Affected by VCID-9nfh-cgh8-ykam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:27:44.215571+00:00 Debian Oval Importer Affected by VCID-k39t-1zme-9kc9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:15:00.163408+00:00 Debian Oval Importer Affected by VCID-c9nm-3ngj-ffch https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:37:22.575114+00:00 Debian Oval Importer Affected by VCID-9nfh-cgh8-ykam https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:28:16.807707+00:00 Debian Oval Importer Affected by VCID-wvtc-3qza-afgh https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:07:46.142531+00:00 Debian Oval Importer Affected by VCID-9nfh-cgh8-ykam https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T11:05:41.766431+00:00 Debian Oval Importer Affected by VCID-wvtc-3qza-afgh https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0