Bugzilla – Bug 1215713
VUL-0: CVE-2023-35945: nghttp2: HTTP/2 memory leak in nghttp2 codec
Last modified: 2024-04-11 10:28:10 UTC
this also affects nghttp2 Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35945
CVE fixed with this commit: https://github.com/nghttp2/nghttp2/pull/1930/commits/ce385d3f55a4b76da976b3bdf71fe2deddf315ba
SUSE-SU-2023:3842-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1215713 CVE References: CVE-2023-35945 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): nghttp2-1.39.2-3.10.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): nghttp2-1.39.2-3.10.1 SUSE Linux Enterprise Server 12 SP5 (src): nghttp2-1.39.2-3.10.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): nghttp2-1.39.2-3.10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All Submit Request done, reassigning to Security team. Don't hesitate to re-assign to coldpool if needed.
SUSE-SU-2023:3997-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1215713 CVE References: CVE-2023-35945 Sources used: openSUSE Leap 15.4 (src): nghttp2-1.40.0-150200.9.1, nghttp2-python-1.40.0-150200.9.1 openSUSE Leap 15.5 (src): nghttp2-1.40.0-150200.9.1, nghttp2-python-1.40.0-150200.9.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro 5.3 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro 5.4 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro 5.5 (src): nghttp2-1.40.0-150200.9.1 Basesystem Module 15-SP4 (src): nghttp2-1.40.0-150200.9.1 Basesystem Module 15-SP5 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nghttp2-1.40.0-150200.9.1 SUSE Manager Proxy 4.2 (src): nghttp2-1.40.0-150200.9.1 SUSE Manager Retail Branch Server 4.2 (src): nghttp2-1.40.0-150200.9.1 SUSE Manager Server 4.2 (src): nghttp2-1.40.0-150200.9.1 SUSE Enterprise Storage 7.1 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro 5.1 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro 5.2 (src): nghttp2-1.40.0-150200.9.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): nghttp2-1.40.0-150200.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4102-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1215713 CVE References: CVE-2023-35945 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.14.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.14.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): nghttp2-1.40.0-150000.3.14.1 SUSE CaaS Platform 4.0 (src): nghttp2-1.40.0-150000.3.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4613-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1215713, 1216174 CVE References: CVE-2023-35945, CVE-2023-44487 Sources used: SUSE CaaS Platform 4.0 (src): release-notes-caasp-4.2.20231122-150100.4.85.1, caasp-release-4.2.10-150100.24.55.2, skuba-1.4.17-150100.3.70.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All affected codestreams have been patched for this issue.