USN-8233-1

Source
https://ubuntu.com/security/notices/USN-8233-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8233-1
Upstream
Related
Published
2026-05-05T17:07:33Z
Modified
2026-05-06T09:14:22.843583690Z
Summary
nghttp2 vulnerability
Details

Andrew MacPherson discovered that nghttp2 did not properly validate internal state when the session termination API was called. A remote attacker could possibly use this issue to cause nghttp2 to crash, resulting in a denial of service.

References

Affected packages

Ubuntu:22.04:LTS
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.43.0-1ubuntu0.3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.43.0-1ubuntu0.3

Affected versions

1.*
1.43.0-1
1.43.0-1build1
1.43.0-1build2
1.43.0-1build3
1.43.0-1ubuntu0.1
1.43.0-1ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.43.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.43.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.43.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.43.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.43.0-1ubuntu0.3"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"
Ubuntu:24.04:LTS
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.59.0-1ubuntu0.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.59.0-1ubuntu0.3

Affected versions

1.*
1.55.1-1
1.57.0-1
1.58.0-1
1.59.0-1
1.59.0-1build1
1.59.0-1build2
1.59.0-1build4
1.59.0-1ubuntu0.1
1.59.0-1ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.59.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.59.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.59.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.59.0-1ubuntu0.3"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.59.0-1ubuntu0.3"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"
Ubuntu:25.10
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.64.0-1.1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.64.0-1.1ubuntu1.1

Affected versions

1.*
1.64.0-1ubuntu1
1.64.0-1.1
1.64.0-1.1build1
1.64.0-1.1ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.64.0-1.1ubuntu1.1"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.64.0-1.1ubuntu1.1"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.64.0-1.1ubuntu1.1"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.64.0-1.1ubuntu1.1"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.64.0-1.1ubuntu1.1"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"
Ubuntu:Pro:16.04:LTS
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.7.1-1ubuntu0.1~esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1-1ubuntu0.1~esm3

Affected versions

0.*
0.6.7-1
1.*
1.3.4-2
1.4.0-1
1.4.0-2
1.5.0-2
1.6.0-1
1.7.0-1
1.7.1-1
1.7.1-1ubuntu0.1~esm1
1.7.1-1ubuntu0.1~esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.7.1-1ubuntu0.1~esm3"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.7.1-1ubuntu0.1~esm3"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.7.1-1ubuntu0.1~esm3"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.7.1-1ubuntu0.1~esm3"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.7.1-1ubuntu0.1~esm3"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"
Ubuntu:Pro:18.04:LTS
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.30.0-1ubuntu1+esm3?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.30.0-1ubuntu1+esm3

Affected versions

1.*
1.25.0-1
1.27.0-1
1.28.0-1
1.29.0-1
1.29.0-1build1
1.30.0-1
1.30.0-1ubuntu1
1.30.0-1ubuntu1+esm1
1.30.0-1ubuntu1+esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.30.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.30.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.30.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.30.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.30.0-1ubuntu1+esm3"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"
Ubuntu:Pro:20.04:LTS
nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.40.0-1ubuntu0.3+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.40.0-1ubuntu0.3+esm1

Affected versions

1.*
1.39.2-1
1.40.0-1
1.40.0-1build1
1.40.0-1ubuntu0.1
1.40.0-1ubuntu0.2
1.40.0-1ubuntu0.3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libnghttp2-14",
            "binary_version": "1.40.0-1ubuntu0.3+esm1"
        },
        {
            "binary_name": "nghttp2",
            "binary_version": "1.40.0-1ubuntu0.3+esm1"
        },
        {
            "binary_name": "nghttp2-client",
            "binary_version": "1.40.0-1ubuntu0.3+esm1"
        },
        {
            "binary_name": "nghttp2-proxy",
            "binary_version": "1.40.0-1ubuntu0.3+esm1"
        },
        {
            "binary_name": "nghttp2-server",
            "binary_version": "1.40.0-1ubuntu0.3+esm1"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-27135",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8233-1.json"