Mageia 2019-0291: nghttp2 security update
Summary
The updated packages fix security vulnerabilities:
Some HTTP/2 implementations are vulnerable to window size manipulation
and stream prioritization manipulation, potentially leading to a denial
of service. The attacker requests a large amount of data from a specified
resource over multiple streams. They manipulate window size and stream
priority to force the server to queue the data in 1-byte chunks. Depending
on how efficiently this data is queued, this can consume excess CPU,
memory, or both. (CVE-2019-9511)
Some HTTP/2 implementations are vulnerable to resource loops, potentially
leading to a denial of service. The attacker creates multiple request
streams and continually shuffles the priority of the streams in a way that
causes substantial churn to the priority tree. This can consume excess CPU.
(CVE-2019-9513)
References
- https://bugs.mageia.org/show_bug.cgi?id=25424
- https://access.redhat.com/errata/RHSA-2019:2692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
Resolution
MGASA-2019-0291 - Updated nghttp2 packages fix security vulnerabilities
SRPMS
- 7/core/nghttp2-1.38.0-1.1.mga7
- 6/core/nghttp2-1.9.2-1.1.mga6