<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libnghttp2-14-1.43.0-1.6 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11091-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libnghttp2-14-1.43.0-1.6 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libnghttp2-14-1.43.0-1.6 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11091</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000168/</URL>
      <Description>SUSE CVE CVE-2018-1000168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9511/</URL>
      <Description>SUSE CVE CVE-2019-9511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11080/</URL>
      <Description>SUSE CVE CVE-2020-11080 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2-14-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2-14-1.43.0-1.6">libnghttp2-14-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2-14-32bit-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2-14-32bit-1.43.0-1.6">libnghttp2-14-32bit-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2-devel-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2-devel-1.43.0-1.6">libnghttp2-devel-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2_asio-devel-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2_asio-devel-1.43.0-1.6">libnghttp2_asio-devel-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2_asio1-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2_asio1-1.43.0-1.6">libnghttp2_asio1-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnghttp2_asio1-32bit-1.43.0-1.6">
      <FullProductName ProductID="libnghttp2_asio1-32bit-1.43.0-1.6">libnghttp2_asio1-32bit-1.43.0-1.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nghttp2-1.43.0-1.6">
      <FullProductName ProductID="nghttp2-1.43.0-1.6">nghttp2-1.43.0-1.6</FullProductName>
    </Branch>
    <Relationship ProductReference="libnghttp2-14-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2-14-1.43.0-1.6">libnghttp2-14-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnghttp2-14-32bit-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2-14-32bit-1.43.0-1.6">libnghttp2-14-32bit-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnghttp2-devel-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2-devel-1.43.0-1.6">libnghttp2-devel-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnghttp2_asio-devel-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2_asio-devel-1.43.0-1.6">libnghttp2_asio-devel-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnghttp2_asio1-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2_asio1-1.43.0-1.6">libnghttp2_asio1-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnghttp2_asio1-32bit-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnghttp2_asio1-32bit-1.43.0-1.6">libnghttp2_asio1-32bit-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nghttp2-1.43.0-1.6" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nghttp2-1.43.0-1.6">nghttp2-1.43.0-1.6 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nghttp2 version &gt;= 1.10.0 and nghttp2 &lt;= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in &gt;= 1.31.1.</Note>
    </Notes>
    <CVE>CVE-2018-1000168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:nghttp2-1.43.0-1.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000168.html</URL>
        <Description>CVE-2018-1000168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088639</URL>
        <Description>SUSE Bug 1088639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097401</URL>
        <Description>SUSE Bug 1097401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.</Note>
    </Notes>
    <CVE>CVE-2019-9511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:nghttp2-1.43.0-1.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9511.html</URL>
        <Description>CVE-2019-9511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145579</URL>
        <Description>SUSE Bug 1145579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146091</URL>
        <Description>SUSE Bug 1146091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146182</URL>
        <Description>SUSE Bug 1146182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193427</URL>
        <Description>SUSE Bug 1193427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202787</URL>
        <Description>SUSE Bug 1202787</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.</Note>
    </Notes>
    <CVE>CVE-2020-11080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-14-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio-devel-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:libnghttp2_asio1-32bit-1.43.0-1.6</ProductID>
        <ProductID>openSUSE Tumbleweed:nghttp2-1.43.0-1.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11080.html</URL>
        <Description>CVE-2020-11080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172441</URL>
        <Description>SUSE Bug 1172441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172442</URL>
        <Description>SUSE Bug 1172442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181358</URL>
        <Description>SUSE Bug 1181358</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
