Source: erlang-cowlib
Version: 1.3.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for erlang-cowlib.

CVE-2026-43970[0]:
| Improper Handling of Highly Compressed Data (Data Amplification)
| vulnerability in ninenines cowlib allows unauthenticated remote
| denial of service via memory exhaustion.  cow_spdy:inflate/2 in
| cowlib passes peer-supplied compressed bytes directly to
| zlib:inflate/2 with no output size bound. The SPDY header
| compression dictionary (?ZDICT) is public, and zlib compresses long
| runs of repeated bytes at roughly 1024:1, so a few kilobytes of SPDY
| frame payload can decompress to gigabytes on the BEAM heap, OOM-
| killing the node. A single unauthenticated SPDY frame is sufficient
| to trigger the condition. The parsers for syn_stream, syn_reply, and
| headers frame types are all affected via cow_spdy:parse_headers/2.
| This issue affects cowlib from 0.1.0 before 2.16.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-43970
    https://www.cve.org/CVERecord?id=CVE-2026-43970
[1] https://cna.erlef.org/cves/CVE-2026-43970.html
[2] https://osv.dev/vulnerability/EEF-CVE-2026-43970
[3] 
https://github.com/ninenines/cowlib/commit/16aad3fb9f81f5cda4d1706ff0c54237c619c282

Regards,
Salvatore

Reply via email to