Source: nghttp2
Version: 1.68.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for nghttp2.

CVE-2026-27135[0]:
| nghttp2 is an implementation of the Hypertext Transfer Protocol
| version 2 in C. Prior to version 1.68.1, the nghttp2 library stops
| reading the incoming data when user facing public API
| `nghttp2_session_terminate_session` or
| `nghttp2_session_terminate_session2` is called by the application.
| They might be called internally by the library when it detects the
| situation that is subject to connection error. Due to the missing
| internal state validation, the library keeps reading the rest of the
| data after one of those APIs is called. Then receiving a malformed
| frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2
| v1.68.1 adds missing state validation to avoid assertion failure. No
| known workarounds are available.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-27135
    https://www.cve.org/CVERecord?id=CVE-2026-27135
[1] https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6
[2] 
https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to