First published: Tue Jun 02 2020(Updated: )
A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nodejs | <=10.20.1~dfsg-1<=10.19.0~dfsg1-1 | 10.21.0~dfsg-1 12.18.0~dfsg-1 10.21.0~dfsg-1~deb10u1 |
Nghttp2 Nghttp2 | <1.41.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =33 | |
Oracle Banking Extensibility Workbench | =14.3.0 | |
Oracle Banking Extensibility Workbench | =14.4.0 | |
Oracle Blockchain Platform | <21.1.2 | |
Oracle Enterprise Communications Broker | =3.1.0 | |
Oracle Enterprise Communications Broker | =3.2.0 | |
Oracle GraalVM | =19.3.2 | |
Oracle GraalVM | =20.1.0 | |
Oracle MySQL | >=7.3.0<=7.3.30 | |
Oracle MySQL | >=7.4.0<=7.4.29 | |
Oracle MySQL | >=7.5.0<=7.5.19 | |
Oracle MySQL | >=7.6.0<=7.6.15 | |
Oracle MySQL | >=8.0.0<=8.0.21 | |
Nodejs Node.js | >=10.0.0<=10.12.0 | |
Nodejs Node.js | >=10.13.0<10.21.0 | |
Nodejs Node.js | >=12.0.0<=12.12.0 | |
Nodejs Node.js | >=12.13.0<12.18.0 | |
Nodejs Node.js | >=14.0.0<=14.4.0 | |
redhat/jbcs-httpd24-curl | <0:7.64.1-36.jbcs.el6 | 0:7.64.1-36.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-57.jbcs.el6 | 0:2.4.37-57.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-25.jbcs.el6 | 0:1.39.2-25.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-36.jbcs.el7 | 0:7.64.1-36.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-57.jbcs.el7 | 0:2.4.37-57.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-25.jbcs.el7 | 0:1.39.2-25.jbcs.el7 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-7.jbcs.el7 | 0:0.4.10-7.jbcs.el7 |
redhat/servicemesh-proxy | <0:1.0.10-3.el8 | 0:1.0.10-3.el8 |
redhat/servicemesh-proxy | <0:1.1.2-3.el8 | 0:1.1.2-3.el8 |
redhat/nghttp2 | <0:1.33.0-3.el8_2.1 | 0:1.33.0-3.el8_2.1 |
redhat/nghttp2 | <0:1.33.0-1.el8_0.2 | 0:1.33.0-1.el8_0.2 |
redhat/nghttp2 | <0:1.33.0-3.el8_1.1 | 0:1.33.0-3.el8_1.1 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el6.1 | 0:1.7.1-8.el6.1 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el7.1 | 0:1.7.1-8.el7.1 |
redhat/rh-nodejs12-nodejs | <0:12.18.2-1.el7 | 0:12.18.2-1.el7 |
redhat/rh-nodejs10-nodejs | <0:10.21.0-3.el7 | 0:10.21.0-3.el7 |
debian/nghttp2 | <=1.36.0-2+deb10u1 | 1.36.0-2+deb10u2 1.43.0-1 1.52.0-1 1.58.0-1 |
debian/nodejs | 10.24.0~dfsg-1~deb10u1 10.24.0~dfsg-1~deb10u3 12.22.12~dfsg-1~deb11u4 18.13.0+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)