JLSEC-2026-2

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-2.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-2.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-2
Upstream
Published
2026-03-23T22:38:33.248Z
Modified
2026-03-23T22:45:06.469288Z
Summary
Envoy is a cloud-native high-performance edge/middle/service proxy
Details

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to GOAWAY frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

Database specific
{
    "sources": [
        {
            "modified": "2024-11-21T08:09:01.860Z",
            "id": "CVE-2023-35945",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-35945",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35945",
            "published": "2023-07-13T21:15:08.880Z",
            "imported": "2026-03-23T22:20:24.437Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / nghttp2_jll

Package

Name
nghttp2_jll
Purl
pkg:julia/nghttp2_jll?uuid=8e850ede-7688-5339-a07c-302acd2aaf8d

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.58.0+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-2.json"