MGASA-2019-0291

Source
https://advisories.mageia.org/MGASA-2019-0291.html
Import Source
https://advisories.mageia.org/MGASA-2019-0291.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0291
Related
Published
2019-09-28T01:05:09Z
Modified
2019-09-28T00:00:24Z
Summary
Updated nghttp2 packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. (CVE-2019-9511)

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. (CVE-2019-9513)

References
Credits

Affected packages

Mageia:6 / nghttp2

Package

Name
nghttp2
Purl
pkg:rpm/mageia/nghttp2?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-1.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / nghttp2

Package

Name
nghttp2
Purl
pkg:rpm/mageia/nghttp2?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.0-1.1.mga7

Ecosystem specific

{
    "section": "core"
}