[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2023-1793 --- nghttp2

ID: oval:org.secpod.oval:def:1601756Date: (C)2023-08-18   (M)2024-01-03
Class: PATCHFamily: unix




Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions 1.26.3, 1.25.8, 1.24.9, 1.23.11

Platform:
Amazon Linux AMI
Product:
nghttp2
libnghttp2
Reference:
ALAS-2023-1793
CVE-2023-35945
CVE    1
CVE-2023-35945

© SecPod Technologies