Arch Linux Security Advisory ASA-201908-17 ========================================== Severity: Medium Date : 2019-08-27 CVE-ID : CVE-2019-9511 CVE-2019-9513 Package : libnghttp2 Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1024 Summary ======= The package libnghttp2 before version 1.39.2-1 is vulnerable to denial of service. Resolution ========== Upgrade to 1.39.2-1. # pacman -Syu "libnghttp2>=1.39.2-1" The problems have been fixed upstream in version 1.39.2. Workaround ========== None. Description =========== - CVE-2019-9511 (denial of service) An issue has been found in several HTTP/2 implementations, where the attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service. - CVE-2019-9513 (denial of service) An issue has been found in several HTTP/2 implementations, where the attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service. Impact ====== A remote attacker is able to cause a denial of service by sending a specially crafted packet. References ========== https://github.com/nghttp2/nghttp2/releases/tag/v1.39.2 https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md https://github.com/nginx/nginx/commit/a987f81dd19210bc30b62591db331e31d3d74089 https://github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f https://security.archlinux.org/CVE-2019-9511 https://security.archlinux.org/CVE-2019-9513