Details: https://kb.cert.org/vuls/id/421644

Affected (amongst others): nodejs, oghttp, nghttp2, Apache httpd, go

Multiple CVEs have been issued.

Quoting from the description:

HTTP allows messages to include named fields in both header and
trailer sections. These header and trailer fields are serialised as
field blocks in HTTP/2, so that they can be transmitted in multiple
fragments to the target implementation. Many HTTP/2 implementations do
not properly limit or sanitize the amount of CONTINUATION frames sent
within a single stream. An attacker that can send packets to a target
server can send a stream of CONTINUATION frames that will not be
appended to the header list in memory but will still be processed and
decoded by the server or will be appended to the header list, causing
an out of memory (OOM) crash.

Marta
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#197943): 
https://lists.openembedded.org/g/openembedded-core/message/197943
Mute This Topic: https://lists.openembedded.org/mt/105317551/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to