Bug 1295351 - (CVE-2015-8659) CVE-2015-8659 nghttp2: heap-use-after-free flaw in idle stream handling code
CVE-2015-8659 nghttp2: heap-use-after-free flaw in idle stream handling code
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20151223,repor...
: Security
Depends On: 1295352 1295354
Blocks:
  Show dependency treegraph
 
Reported: 2016-01-04 04:01 EST by Martin Prpič
Modified: 2016-03-04 06:38 EST (History)
2 users (show)

See Also:
Fixed In Version: nghttp2 1.6.0
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Prpič 2016-01-04 04:01:49 EST
Nghttp2 v1.6.0 fixed one security issue:

This release fixes heap-use-after-free bug in idle stream handling code.

CVE assigned in:

http://seclists.org/oss-sec/2015/q4/572

External References:

https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/
Comment 1 Martin Prpič 2016-01-04 04:02:10 EST
Created nghttp2 tracking bugs for this issue:

Affects: fedora-all [bug 1295352]
Affects: epel-7 [bug 1295354]
Comment 2 Fedora Update System 2016-01-07 14:54:11 EST
nghttp2-1.6.0-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Comment 3 Fedora Update System 2016-01-12 03:21:42 EST
nghttp2-1.6.0-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
Comment 4 Fedora Update System 2016-01-20 23:38:39 EST
nghttp2-1.6.0-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.