MGASA-2019-0291 - Updated nghttp2 packages fix security vulnerabilities

Publication date: 28 Sep 2019
URL: https://advisories.mageia.org/MGASA-2019-0291.html
Type: security
Affected Mageia releases: 6, 7
CVE: CVE-2019-9511,
     CVE-2019-9513

The updated packages fix security vulnerabilities:

Some HTTP/2 implementations are vulnerable to window size manipulation
and stream prioritization manipulation, potentially leading to a denial
of service. The attacker requests a large amount of data from a specified
resource over multiple streams. They manipulate window size and stream
priority to force the server to queue the data in 1-byte chunks. Depending
on how efficiently this data is queued, this can consume excess CPU,
memory, or both. (CVE-2019-9511)

Some HTTP/2 implementations are vulnerable to resource loops, potentially
leading to a denial of service. The attacker creates multiple request
streams and continually shuffles the priority of the streams in a way that
causes substantial churn to the priority tree. This can consume excess CPU.
(CVE-2019-9513)

References:
- https://bugs.mageia.org/show_bug.cgi?id=25424
- https://access.redhat.com/errata/RHSA-2019:2692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513

SRPMS:
- 7/core/nghttp2-1.38.0-1.1.mga7
- 6/core/nghttp2-1.9.2-1.1.mga6

Mageia 2019-0291: nghttp2 security update

The updated packages fix security vulnerabilities: Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leadi...

Summary

The updated packages fix security vulnerabilities:
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. (CVE-2019-9511)
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. (CVE-2019-9513)

References

- https://bugs.mageia.org/show_bug.cgi?id=25424

- https://access.redhat.com/errata/RHSA-2019:2692

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513

Resolution

MGASA-2019-0291 - Updated nghttp2 packages fix security vulnerabilities

SRPMS

- 7/core/nghttp2-1.38.0-1.1.mga7

- 6/core/nghttp2-1.9.2-1.1.mga6

Severity
Publication date: 28 Sep 2019
URL: https://advisories.mageia.org/MGASA-2019-0291.html
Type: security
CVE: CVE-2019-9511, CVE-2019-9513

Related News