Name | CVE-2019-9512 |
Description | Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2485-1, DSA-4503-1, DSA-4508-1, DSA-4520-1 |
Debian Bugs | 934886, 934887, 934955 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
golang (PTS) | jessie, jessie (lts) | 2:1.3.3-1+deb8u5 | fixed |
golang-1.11 (PTS) | buster (security), buster, buster (lts) | 1.11.6-1+deb10u7 | fixed |
golang-1.7 (PTS) | stretch (security), stretch (lts), stretch | 1.7.4-2+deb9u5 | vulnerable |
golang-1.8 (PTS) | stretch (security), stretch (lts), stretch | 1.8.1-1+deb9u5 | vulnerable |
golang-golang-x-net-dev (PTS) | stretch (security), stretch (lts), stretch | 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 | fixed |
buster | 1:0.0+git20181201.351d144+dfsg-3 | vulnerable | |
h2o (PTS) | buster (security), buster, buster (lts) | 2.2.5+dfsg2-2+deb10u2 | fixed |
bullseye | 2.2.5+dfsg2-6 | fixed | |
bookworm | 2.2.5+dfsg2-7 | fixed | |
sid, trixie | 2.2.5+dfsg2-9 | fixed | |
trafficserver (PTS) | buster (security), buster, buster (lts) | 8.1.7-0+deb10u4 | fixed |
bullseye | 8.1.10+ds-1~deb11u1 | fixed | |
bullseye (security) | 8.1.11+ds-0+deb11u1 | fixed | |
bookworm (security), bookworm | 9.2.5+ds-0+deb12u1 | fixed | |
sid | 9.2.5+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
golang | source | wheezy | (unfixed) | end-of-life | ||
golang | source | jessie | (not affected) | |||
golang | source | (unstable) | (unfixed) | |||
golang-1.11 | source | buster | 1.11.6-1+deb10u1 | DSA-4503-1 | ||
golang-1.11 | source | (unstable) | 1.11.13-1 | |||
golang-1.12 | source | (unstable) | 1.12.8-1 | |||
golang-1.13 | source | (unstable) | 1.13~beta1-3 | 934955 | ||
golang-1.7 | source | (unstable) | (unfixed) | |||
golang-1.8 | source | (unstable) | (unfixed) | |||
golang-golang-x-net-dev | source | stretch | 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 | DLA-2485-1 | ||
golang-golang-x-net-dev | source | (unstable) | 1:0.0+git20190811.74dc4d7+dfsg-1 | |||
h2o | source | buster | 2.2.5+dfsg2-2+deb10u1 | DSA-4508-1 | ||
h2o | source | (unstable) | 2.2.5+dfsg2-3 | 934886 | ||
trafficserver | source | wheezy | (unfixed) | end-of-life | ||
trafficserver | source | buster | 8.0.2+ds-1+deb10u1 | DSA-4520-1 | ||
trafficserver | source | (unstable) | 8.0.5+ds-1 | 934887 |
[stretch] - golang-1.8 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[stretch] - golang-1.7 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[jessie] - golang <not-affected> (No HTTP2 support yet)
[buster] - golang-golang-x-net-dev <postponed> (Limited support, minor issue, DoS)
Issue: https://github.com/golang/go/issues/33606
https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
https://github.com/golang/go/commit/7139b45d1410ded14e1e131151fd8dfc435ede6c (golang-1.12)
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
https://github.com/h2o/h2o/issues/2090
https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f