turkdevops / node

Node.js JavaScript runtime :sparkles::turtle::rocket::sparkles:
https://nodejs.org/
Other
0 stars 0 forks source link

CVE-2023-35945 (High) detected in nghttp2v1.41.0 #612

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-35945 - High Severity Vulnerability

Vulnerable Library - nghttp2v1.41.0

nghttp2 - HTTP/2 C Library and tools

Library home page: https://github.com/nghttp2/nghttp2.git

Found in HEAD commit: 00fdb00d5bdbaea4fec4642989374d82cbdb1a3c

Found in base branch: master

Vulnerable Source Files (2)

/deps/nghttp2/lib/nghttp2_session.c /deps/nghttp2/lib/nghttp2_session.c

Vulnerability Details

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

Publish Date: 2023-07-13

URL: CVE-2023-35945

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-07-13

Fix Resolution: v1.55.1


Step up your Open Source Security Game with Mend here