First published: Mon Feb 15 2016(Updated: )
A vulnerability was found in a way nghttp2 processes incoming packets. Nghttpd, nghttp, and libnghttp2_asio applications do not limit the memory usage for the incoming HTTP header field. If peer sends specially crafted HTTP/2 HEADERS frames and CONTINUATION frames, they will crash with out of memory error. Upstream report and fix: <a href="https://github.com/tatsuhiro-t/nghttp2/releases/tag/v1.7.1">https://github.com/tatsuhiro-t/nghttp2/releases/tag/v1.7.1</a>
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nghttp2 | <1.7.1 | 1.7.1 |
Nghttp2 Nghttp2 | <1.7.1 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.