TencentOS Server 4: nginx (TSSA-2024:0615)

high Nessus Plugin ID 239513

Synopsis

The remote TencentOS Server 4 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0615 advisory.

Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:

CVE-2024-24989:
A flaw was found in the nginx HTTP/3 implementation. This issue may allow an attacker to use a specially crafted QUIC session to trigger a NULL pointer dereference error, causing a worker process to crash, leading to a denial of service.

CVE-2024-24990:
/nWhen NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate./n/nNote: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html ./n/n/n/n /n/n/nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20240615.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24989

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24990

Plugin Details

Severity: High

ID: 239513

File Name: tencentos_TSSA_2024_0615.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:nginx, cpe:/o:tencent:tencentos_server:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/24/2024

Vulnerability Publication Date: 10/24/2024