Arch Linux Security Advisory ASA-201908-17
=========================================
Severity: Medium
Date    : 2019-08-27
CVE-ID  : CVE-2019-9511 CVE-2019-9513
Package : libnghttp2
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1024

Summary
======
The package libnghttp2 before version 1.39.2-1 is vulnerable to denial
of service.

Resolution
=========
Upgrade to 1.39.2-1.

# pacman -Syu "libnghttp2>=1.39.2-1"

The problems have been fixed upstream in version 1.39.2.

Workaround
=========
None.

Description
==========
- CVE-2019-9511 (denial of service)

An issue has been found in several HTTP/2 implementations, where the
attacker requests a large amount of data from a specified resource over
multiple streams. They manipulate window size and stream priority to
force the server to queue the data in 1-byte chunks. Depending on how
efficiently this data is queued, this can consume excess CPU, memory,
or both, potentially leading to a denial of service.

- CVE-2019-9513 (denial of service)

An issue has been found in several HTTP/2 implementations, where the
attacker creates multiple request streams and continually shuffles the
priority of the streams in a way that causes substantial churn to the
priority tree. This can consume excess CPU, potentially leading to a
denial of service.

Impact
=====
A remote attacker is able to cause a denial of service by sending a
specially crafted packet.

References
=========
https://github.com/nghttp2/nghttp2/releases/tag/v1.39.2
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://github.com/nginx/nginx/commit/a987f81dd19210bc30b62591db331e31d3d74089
https://github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f
https://security.archlinux.org/CVE-2019-9511
https://security.archlinux.org/CVE-2019-9513

ArchLinux: 201908-17: libnghttp2: denial of service

August 29, 2019

Summary

- CVE-2019-9511 (denial of service) An issue has been found in several HTTP/2 implementations, where the attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9513 (denial of service)
An issue has been found in several HTTP/2 implementations, where the attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.

Resolution

Upgrade to 1.39.2-1. # pacman -Syu "libnghttp2>=1.39.2-1"
The problems have been fixed upstream in version 1.39.2.

References

https://github.com/nghttp2/nghttp2/releases/tag/v1.39.2 https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md https://github.com/nginx/nginx/commit/a987f81dd19210bc30b62591db331e31d3d74089 https://github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f https://security.archlinux.org/CVE-2019-9511 https://security.archlinux.org/CVE-2019-9513

Severity
Package : libnghttp2
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1024

Workaround

None.

Related News