Bug 1215713 (CVE-2023-35945) - VUL-0: CVE-2023-35945: nghttp2: HTTP/2 memory leak in nghttp2 codec
Summary: VUL-0: CVE-2023-35945: nghttp2: HTTP/2 memory leak in nghttp2 codec
Status: RESOLVED FIXED
Alias: CVE-2023-35945
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/372438/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-35945:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-26 08:35 UTC by SMASH SMASH
Modified: 2024-04-11 10:28 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-09-26 08:35:39 UTC
this also affects nghttp2

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s
HTTP/2 codec may leak a header map and bookkeeping structures upon receiving
`RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream
server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY`
frame skips de-allocation of the bookkeeping structure and pending compressed
header. The error return [code path] is taken if connection is already marked
for not sending more requests due to `GOAWAY` frame. The clean-up code is right
after the return statement, causing memory leak. Denial of service through
memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8,
1.24.9, 1.23.11.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35945
Comment 1 Valentin Lefebvre 2023-09-26 13:17:43 UTC
CVE fixed with this commit: https://github.com/nghttp2/nghttp2/pull/1930/commits/ce385d3f55a4b76da976b3bdf71fe2deddf315ba
Comment 7 Maintenance Automation 2023-09-27 20:30:11 UTC
SUSE-SU-2023:3842-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1215713
CVE References: CVE-2023-35945
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): nghttp2-1.39.2-3.10.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): nghttp2-1.39.2-3.10.1
SUSE Linux Enterprise Server 12 SP5 (src): nghttp2-1.39.2-3.10.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): nghttp2-1.39.2-3.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Valentin Lefebvre 2023-10-02 07:50:50 UTC
All Submit Request done, reassigning to Security team. Don't hesitate to re-assign to coldpool if needed.
Comment 9 Maintenance Automation 2023-10-06 16:29:15 UTC
SUSE-SU-2023:3997-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1215713
CVE References: CVE-2023-35945
Sources used:
openSUSE Leap 15.4 (src): nghttp2-1.40.0-150200.9.1, nghttp2-python-1.40.0-150200.9.1
openSUSE Leap 15.5 (src): nghttp2-1.40.0-150200.9.1, nghttp2-python-1.40.0-150200.9.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro 5.3 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro 5.4 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro 5.5 (src): nghttp2-1.40.0-150200.9.1
Basesystem Module 15-SP4 (src): nghttp2-1.40.0-150200.9.1
Basesystem Module 15-SP5 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nghttp2-1.40.0-150200.9.1
SUSE Manager Proxy 4.2 (src): nghttp2-1.40.0-150200.9.1
SUSE Manager Retail Branch Server 4.2 (src): nghttp2-1.40.0-150200.9.1
SUSE Manager Server 4.2 (src): nghttp2-1.40.0-150200.9.1
SUSE Enterprise Storage 7.1 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro 5.1 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro 5.2 (src): nghttp2-1.40.0-150200.9.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): nghttp2-1.40.0-150200.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-10-17 16:30:06 UTC
SUSE-SU-2023:4102-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1215713
CVE References: CVE-2023-35945
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.14.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.14.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): nghttp2-1.40.0-150000.3.14.1
SUSE CaaS Platform 4.0 (src): nghttp2-1.40.0-150000.3.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-11-29 16:30:04 UTC
SUSE-SU-2023:4613-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215713, 1216174
CVE References: CVE-2023-35945, CVE-2023-44487
Sources used:
SUSE CaaS Platform 4.0 (src): release-notes-caasp-4.2.20231122-150100.4.85.1, caasp-release-4.2.10-150100.24.55.2, skuba-1.4.17-150100.3.70.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Camila Camargo de Matos 2024-04-11 10:28:10 UTC
All affected codestreams have been patched for this issue.