• [gentoo-announce] [ GLSA 202408-10 ] nghttp2: Multiple Vulnerabilities

    From glsamaker@gentoo.org@21:1/5 to All on Wed Aug 7 13:40:02 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202408-10
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: nghttp2: Multiple Vulnerabilities
    Date: August 07, 2024
    Bugs: #915554, #928541
    ID: 202408-10

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in nghttp2, the worst of
    which could lead to a denial of service.

    Background
    ==========

    Nghttp2 is an implementation of HTTP/2 and its header compression
    algorithm HPACK in C.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------------- ------------ ------------
    net-libs/nghttp2 < 1.61.0 >= 1.61.0

    Description
    ===========

    Multiple vulnerabilities have been discovered in nghttp2. Please review
    the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All nghttp2 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-libs/nghttp2-1.61.0"

    References
    ==========

    [ 1 ] CVE-2023-44487
    https://nvd.nist.gov/vuln/detail/CVE-2023-44487
    [ 2 ] CVE-2024-28182
    https://nvd.nist.gov/vuln/detail/CVE-2024-28182

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202408-10

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmazXI4ACgkQFMQkOaVy +9kqQg/9F1Kj1RD/yIRBIPzhJL2wV45+Bm4xoPBk40TY2aFUx0qsu0SaF6mwVRjI 8sOQXcJy+HPdb/81ZvhV8ix+GzIsFW+wDeygY802RMas/oGYENxbOZ2VkRFB9exk Nr9W351mifLH9AxQ9CSFyJ0mahEE6TQQfUFtG0snu+fYQl99/TZwywafhZyLnzqL UKRPzmS5SYkI5/VYWqza9cTM5+/PrXOnEskXy+MmrT9L0lzyWsvm2dheT0uEB5eQ ClzQuTVxoklpa6k2S6sdrpewRkJbbSsxOuIoYBroam0L1MLSfHXE7z+2rN+p5puJ wXsbkxKpNT6n0L+J3/qvrVsGyZWrNMov3mRxRTvO8u1IGSJBFuMIAwQjsvh7TQfm 6frwf4o9LYYp1ea/c3HUHIOpQqETW3CZ+k9Ttr6wjl9LhkbK9xBuey2pmiyleyLt SNHlQ5yC55dLRpM/KHUPFS/cupzeymfVKwPf6bPtdkmN6ir6M1Xl0e9YYcWr2vjF p2UbePXFUrtkoZaPg0O/pPPCBrCw2N3n7dZ1w3lWrzcToZzEmrPB+uyhTjlUWd5F OBpmoqoi/iwT+vR58IDAkYziCITIMnW+AeQkIbN5vd/d9K13mp60nEX8Q/0q1Uws 2AloDVQx+9LVBhXqGn5DD0NiC8NKCOa+PiH7WV6cVb9aObYiFVk=
    =XqjY
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)