Amazon Linux 2 Security Advisory: ALAS-2019-1298
Advisory Release Date: 2019-10-08 21:43 Pacific
Advisory Updated Date: 2019-10-09 23:18 Pacific
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.(CVE-2019-9511)
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.(CVE-2019-9513)
Affected Packages:
nghttp2
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update nghttp2 to update your system.
aarch64:
nghttp2-1.39.2-1.amzn2.aarch64
libnghttp2-1.39.2-1.amzn2.aarch64
libnghttp2-devel-1.39.2-1.amzn2.aarch64
nghttp2-debuginfo-1.39.2-1.amzn2.aarch64
i686:
nghttp2-1.39.2-1.amzn2.i686
libnghttp2-1.39.2-1.amzn2.i686
libnghttp2-devel-1.39.2-1.amzn2.i686
nghttp2-debuginfo-1.39.2-1.amzn2.i686
src:
nghttp2-1.39.2-1.amzn2.src
x86_64:
nghttp2-1.39.2-1.amzn2.x86_64
libnghttp2-1.39.2-1.amzn2.x86_64
libnghttp2-devel-1.39.2-1.amzn2.x86_64
nghttp2-debuginfo-1.39.2-1.amzn2.x86_64