From ${URL} : A vulnerability was found in a way nghttp2 processes incoming packets. Nghttpd, nghttp, and libnghttp2_asio applications do not limit the memory usage for the incoming HTTP header field. If peer sends specially crafted HTTP/2 HEADERS frames and CONTINUATION frames, they will crash with out of memory error. Upstream report and fix: https://github.com/tatsuhiro-t/nghttp2/releases/tag/v1.7.1 @maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
1.7.1 is fine to stabilize
Stable for HPPA PPC64.
amd64 stable
x86 stable
Stable on alpha.
ppc stable
sparc stable
ia64 stable
done the rest now
@ Security: Waiting for GLSA/CVE...
New GLSA created.
This issue was resolved and addressed in GLSA 201612-13 at https://security.gentoo.org/glsa/201612-13 by GLSA coordinator Aaron Bauman (b-man).