[arch-security] [ASA-201512-16] nghttp2: use-after-free

Remi Gacogne rgacogne at archlinux.org
Fri Dec 25 17:21:18 UTC 2015


Arch Linux Security Advisory ASA-201512-16
==========================================

Severity: High
Date    : 2015-12-25
CVE-ID  : CVE-2015-8659
Package : nghttp2
Type    : use-after-free
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package nghttp2 before version 1.6.0-1 is vulnerable to a heap-based
use-after-free, leading to denial of service or possibly arbitrary code
execution.

Resolution
==========

Upgrade to 1.6.0-1.

# pacman -Syu "nghttp2>=1.6.0-1"

The problem has been fixed upstream in version 1.6.0.

Workaround
==========

None.

Description
===========

nghttp2 1.6.0 fixes a heap-based use-after-free bug in idle stream
handling code, where an idle/closed stream could possibly be destroyed
while it was still referenced.

Impact
======

A remote attacker could exploit this bug in a HTTP/2 client or server,
leading to denial of service or even arbitrary code execution.

References
==========

https://access.redhat.com/security/cve/CVE-2015-8659
http://seclists.org/oss-sec/2015/q4/576
https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/
https://github.com/tatsuhiro-t/nghttp2/commit/92a56d034f201cbb609606184822cf1716677207

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20151225/741988fb/attachment.asc>


More information about the arch-security mailing list