Bugzilla – Bug 1222512
VUL-0: CVE-2024-28871: libhtp: excessive CPU usage when parsing malformed traffic
Last modified: 2024-06-01 20:16:01 UTC
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-28871 https://www.cve.org/CVERecord?id=CVE-2024-28871 https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg https://redmine.openinfosecfoundation.org/issues/6757
As per the GitHub advisory [0], this seems to have been introduced in version 0.5.46 by commit bf618ec7 [1]. The fix can be found in commit 79e713f3 [2]. openSUSE:Factory/libhtp is affected by this issue. [0] https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg [1] https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d [2] https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed
Resolved by a version upgrade to 0.5.48 > https://build.opensuse.org/request/show/1170919 Assigning back to security team.
fixed in Tumbleweed, moving/closing