@@ -151,9 +151,6 @@ Http2Options::Http2Options(Environment* env, nghttp2_session_type type) {
151151        buffer[IDX_OPTIONS_PEER_MAX_CONCURRENT_STREAMS]);
152152  }
153153
154-   if  (IsReverted (SECURITY_REVERT_CVE_2019_9512))
155-     nghttp2_option_set_max_outbound_ack (options_, 10000 );
156- 
157154  //  The padding strategy sets the mechanism by which we determine how much
158155  //  additional frame padding to apply to DATA and HEADERS frames. Currently
159156  //  this is set on a per-session basis, but eventually we may switch to
@@ -919,10 +916,8 @@ int Http2Session::OnBeginHeadersCallback(nghttp2_session* handle,
919916    if  (UNLIKELY (!session->CanAddStream () ||
920917                 Http2Stream::New (session, id, frame->headers .cat ) ==
921918                     nullptr )) {
922-       if  (session->rejected_stream_count_ ++ > 100  &&
923-           !IsReverted (SECURITY_REVERT_CVE_2019_9514)) {
919+       if  (session->rejected_stream_count_ ++ > 100 )
924920        return  NGHTTP2_ERR_CALLBACK_FAILURE;
925-       }
926921      //  Too many concurrent streams being opened
927922      nghttp2_submit_rst_stream (**session, NGHTTP2_FLAG_NONE, id,
928923                                NGHTTP2_ENHANCE_YOUR_CALM);
@@ -1013,10 +1008,8 @@ int Http2Session::OnInvalidFrame(nghttp2_session* handle,
10131008  Http2Session* session = static_cast <Http2Session*>(user_data);
10141009
10151010  Debug (session, " invalid frame received, code: %d"  , lib_error_code);
1016-   if  (session->invalid_frame_count_ ++ > 1000  &&
1017-       !IsReverted (SECURITY_REVERT_CVE_2019_9514)) {
1011+   if  (session->invalid_frame_count_ ++ > 1000 )
10181012    return  1 ;
1019-   }
10201013
10211014  //  If the error is fatal or if error code is ERR_STREAM_CLOSED... emit error
10221015  if  (nghttp2_is_fatal (lib_error_code) ||
@@ -1383,8 +1376,7 @@ int Http2Session::HandleDataFrame(const nghttp2_frame* frame) {
13831376
13841377  if  (!stream->IsDestroyed () && frame->hd .flags  & NGHTTP2_FLAG_END_STREAM) {
13851378    stream->EmitRead (UV_EOF);
1386-   } else  if  (frame->hd .length  == 0  &&
1387-            !IsReverted (SECURITY_REVERT_CVE_2019_9518)) {
1379+   } else  if  (frame->hd .length  == 0 ) {
13881380    return  1 ;  //  Consider 0-length frame without END_STREAM an error.
13891381  }
13901382  return  0 ;
@@ -2269,9 +2261,7 @@ bool Http2Stream::AddHeader(nghttp2_rcbuf* name,
22692261  if  (this ->statistics_ .first_header  == 0 )
22702262    this ->statistics_ .first_header  = uv_hrtime ();
22712263  size_t  name_len = nghttp2_rcbuf_get_buf (name).len ;
2272-   if  (name_len == 0  && !IsReverted (SECURITY_REVERT_CVE_2019_9516)) {
2273-     return  true ;  //  Ignore headers with empty names.
2274-   }
2264+   if  (name_len == 0 ) return  true ;  //  Ignore headers with empty names.
22752265  size_t  value_len = nghttp2_rcbuf_get_buf (value).len ;
22762266  size_t  length = name_len + value_len + 32 ;
22772267  //  A header can only be added if we have not exceeded the maximum number
0 commit comments