HTTP/2 and its header compression algorithm HPACK implementation.
The framing layer of HTTP/2 is implemented as a reusable library.
Also included are an HTTP/2 client, server, proxy, load test and
benchmarking tool.

For more information see the project home page:

        https://nghttp2.org/

or the repo README:

        https://github.com/nghttp2/nghttp2#readme

NOTES:

Support for previously deprecated Python bindings, modules, and
documentation was dropped some releases ago.

The following packages have been upgraded in the Cygwin distribution:

- nghttp2                       1.68.1
- libnghttp2-devel              1.68.1
- libnghttp2_14                 1.68.1
- mingw64-x86_64-nghttp2        1.68.1

For changes since the previous Cygwin release, see below or
https://nghttp2.org/blog/; for complete details of changes see
/usr/share/doc/nghttp2/ChangeLog after installation.


2026-03-18      1.68.1

   Do not download the archive files generated by GitHub.
   They do not work.
   Please download the signed and versioned tar balls, such as
   nghttp2-1.68.1.tar.gz.

   This release includes security advisory.

Security Advisory

   CVE-2026-27135: Denial of service: Assertion failure due to the missing
                   state validation

Denial of service: Assertion failure due to the missing state validation

   High

   tatsuhiro-t published GHSA-6933-cjhr-5qg6 Mar 18, 2026

Package

   nghttp2

Affected versions

   <= 1.68.0

Patched versions

   1.68.1

Description

Impact

   nghttp2 library stops reading the incoming data when user facing
   public API nghttp2_session_terminate_session or
   nghttp2_session_terminate_session2 is called by the application.
   They might be called internally by the library when it detects the
   situation that is subject to connection error.

   Due to the missing internal state validation, the library keeps
   reading the rest of the data after one of those APIs is called. Then
   receiving a malformed frame that causes FRAME_SIZE_ERROR causes
   assertion failure.

   nghttp2_session_terminate_session and
   nghttp2_session_terminate_session2 are used interchangeably in the
   rest of this document.

   The detailed execution paths that lead to assertion failure are:
     - nghttp2_session_terminate_session is called from
       nghttp2_on_invalid_frame_recv_callback when processing incoming
       ALTSVC (RFC 7838) frame, and then a malformed frame that causes
       FRAME_SIZE_ERROR is received.
     - nghttp2_session_terminate_session is called from
       nghttp2_on_frame_recv_callback when processing PRIORITY_UPDATE,
       ALTSVC, or user-defined extension frame, and then a malformed frame
       that causes FRAME_SIZE_ERROR is received.
     - nghttp2_session_terminate_session is called from
       nghttp2_on_extension_chunk_recv_callback when processing
       user-defined extension frame, and then a malformed frame that
       causes
       FRAME_SIZE_ERROR is received.
     - nghttp2_session_terminate_session is called from
       nghttp2_unpack_extension_callback when processing user-defined
       extension frame, and then a malformed frame that causes
       FRAME_SIZE_ERROR is received.
     - The malformed PRIORITY_UPDATE frame (e.g., stream_id == 0) is
       received, and then a malformed frame that causes FRAME_SIZE_ERROR
       is
       received.

   For PRIORITY_UPDATE and ALTSVC frames, they must be explicitly enabled
   via nghttp2_option_set_builtin_recv_extension_type to be affected.

   For user-defined extension frames, they must be explicitly enabled via
   nghttp2_option_set_user_recv_extension_type to be affected.

   For the builds that disable assert macro (e.g, -DNDEBUG), it does
   not hit assertion failure, but it might continue reading incoming
   data, which itself does not cause any vulnerability as far as we know.
   We still strongly encourage to apply the patch for those builds as
   well.

   The reporter found the cases where ALTSVC is involved. The other
   cases have been investigated and discovered by the nghttp2 development
   team.

Patches

   nghttp2 v1.68.1 adds missing state validation to avoid assertion
   failure.

Workarounds

   There is no workaround.

References

   The commit 5c7df8f fixes this vulnerability.

Severity

   High

CVSS overall score

   This score calculates overall vulnerability severity from 0 to 10 and
   is based on the Common Vulnerability Scoring System (CVSS).
   7.5 / 10

CVSS v3 base metrics

   CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

   Attack vector        Network
   Attack complexity    Low
   Privileges required  None
   User interaction     None
   Scope                Unchanged
   Confidentiality      None
   Integrity            None
   Availability         High

   Attack vector:       More severe the more the remote (logically and
                        physically) an attacker can be in order to
                        exploit the vulnerability.
   Attack complexity:   More severe for the least complex attacks.
   Privileges required: More severe if no privileges are required.
   User interaction:    More severe when no user interaction is required.
   Scope:               More severe when a scope change occurs, e.g. one
                        vulnerable component impacts resources in
                        components beyond its security scope.
   Confidentiality:     More severe when loss of data confidentiality is
                        highest, measuring the level of data access
                        available to an unauthorized user.
   Integrity:           More severe when loss of data integrity is the
                        highest, measuring the consequence of data
                        modification possible by an unauthorized user.
   Availability:        More severe when the loss of impacted component
                        availability is highest.

CVE ID          CVE-2026-27135

Weaknesses      No CWEs

Credits         @AndrewMohawk AndrewMohawk Reporter

-- 
              *** CYGWIN-ANNOUNCE UNSUBSCRIBE INFO ***

The easiest way to unsubscribe is to visit 
<https://cygwin.com/mailman/options/cygwin-announce>, and click 'Unsubscribe'.

If you need more information on unsubscribing, start reading here: 
<https://sourceware.org/lists.html#unsubscribe>.

Reply via email to