@@ -151,9 +151,6 @@ Http2Options::Http2Options(Environment* env, nghttp2_session_type type) {
151
151
buffer[IDX_OPTIONS_PEER_MAX_CONCURRENT_STREAMS]);
152
152
}
153
153
154
- if (IsReverted (SECURITY_REVERT_CVE_2019_9512))
155
- nghttp2_option_set_max_outbound_ack (options_, 10000 );
156
-
157
154
// The padding strategy sets the mechanism by which we determine how much
158
155
// additional frame padding to apply to DATA and HEADERS frames. Currently
159
156
// this is set on a per-session basis, but eventually we may switch to
@@ -919,10 +916,8 @@ int Http2Session::OnBeginHeadersCallback(nghttp2_session* handle,
919
916
if (UNLIKELY (!session->CanAddStream () ||
920
917
Http2Stream::New (session, id, frame->headers .cat ) ==
921
918
nullptr )) {
922
- if (session->rejected_stream_count_ ++ > 100 &&
923
- !IsReverted (SECURITY_REVERT_CVE_2019_9514)) {
919
+ if (session->rejected_stream_count_ ++ > 100 )
924
920
return NGHTTP2_ERR_CALLBACK_FAILURE;
925
- }
926
921
// Too many concurrent streams being opened
927
922
nghttp2_submit_rst_stream (**session, NGHTTP2_FLAG_NONE, id,
928
923
NGHTTP2_ENHANCE_YOUR_CALM);
@@ -1013,10 +1008,8 @@ int Http2Session::OnInvalidFrame(nghttp2_session* handle,
1013
1008
Http2Session* session = static_cast <Http2Session*>(user_data);
1014
1009
1015
1010
Debug (session, " invalid frame received, code: %d" , lib_error_code);
1016
- if (session->invalid_frame_count_ ++ > 1000 &&
1017
- !IsReverted (SECURITY_REVERT_CVE_2019_9514)) {
1011
+ if (session->invalid_frame_count_ ++ > 1000 )
1018
1012
return 1 ;
1019
- }
1020
1013
1021
1014
// If the error is fatal or if error code is ERR_STREAM_CLOSED... emit error
1022
1015
if (nghttp2_is_fatal (lib_error_code) ||
@@ -1383,8 +1376,7 @@ int Http2Session::HandleDataFrame(const nghttp2_frame* frame) {
1383
1376
1384
1377
if (!stream->IsDestroyed () && frame->hd .flags & NGHTTP2_FLAG_END_STREAM) {
1385
1378
stream->EmitRead (UV_EOF);
1386
- } else if (frame->hd .length == 0 &&
1387
- !IsReverted (SECURITY_REVERT_CVE_2019_9518)) {
1379
+ } else if (frame->hd .length == 0 ) {
1388
1380
return 1 ; // Consider 0-length frame without END_STREAM an error.
1389
1381
}
1390
1382
return 0 ;
@@ -2269,9 +2261,7 @@ bool Http2Stream::AddHeader(nghttp2_rcbuf* name,
2269
2261
if (this ->statistics_ .first_header == 0 )
2270
2262
this ->statistics_ .first_header = uv_hrtime ();
2271
2263
size_t name_len = nghttp2_rcbuf_get_buf (name).len ;
2272
- if (name_len == 0 && !IsReverted (SECURITY_REVERT_CVE_2019_9516)) {
2273
- return true ; // Ignore headers with empty names.
2274
- }
2264
+ if (name_len == 0 ) return true ; // Ignore headers with empty names.
2275
2265
size_t value_len = nghttp2_rcbuf_get_buf (value).len ;
2276
2266
size_t length = name_len + value_len + 32 ;
2277
2267
// A header can only be added if we have not exceeded the maximum number
0 commit comments