CVE-2019-9512

NameCVE-2019-9512
DescriptionSome HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2485-1, DSA-4503-1, DSA-4508-1, DSA-4520-1
Debian Bugs934886, 934887, 934955

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang (PTS)jessie, jessie (lts)2:1.3.3-1+deb8u5fixed
golang-1.11 (PTS)buster (security), buster, buster (lts)1.11.6-1+deb10u7fixed
golang-1.7 (PTS)stretch (security), stretch (lts), stretch1.7.4-2+deb9u5vulnerable
golang-1.8 (PTS)stretch (security), stretch (lts), stretch1.8.1-1+deb9u5vulnerable
golang-golang-x-net-dev (PTS)stretch (security), stretch (lts), stretch1:0.0+git20161013.8b4af36+dfsg-3+deb9u1fixed
buster1:0.0+git20181201.351d144+dfsg-3vulnerable
h2o (PTS)buster (security), buster, buster (lts)2.2.5+dfsg2-2+deb10u2fixed
bullseye2.2.5+dfsg2-6fixed
bookworm2.2.5+dfsg2-7fixed
sid, trixie2.2.5+dfsg2-9fixed
trafficserver (PTS)buster (security), buster, buster (lts)8.1.7-0+deb10u4fixed
bullseye8.1.10+ds-1~deb11u1fixed
bullseye (security)8.1.11+ds-0+deb11u1fixed
bookworm9.2.4+ds-0+deb12u1fixed
bookworm (security)9.2.5+ds-0+deb12u1fixed
sid9.2.5+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golangsourcewheezy(unfixed)end-of-life
golangsourcejessie(not affected)
golangsource(unstable)(unfixed)
golang-1.11sourcebuster1.11.6-1+deb10u1DSA-4503-1
golang-1.11source(unstable)1.11.13-1
golang-1.12source(unstable)1.12.8-1
golang-1.13source(unstable)1.13~beta1-3934955
golang-1.7source(unstable)(unfixed)
golang-1.8source(unstable)(unfixed)
golang-golang-x-net-devsourcestretch1:0.0+git20161013.8b4af36+dfsg-3+deb9u1DLA-2485-1
golang-golang-x-net-devsource(unstable)1:0.0+git20190811.74dc4d7+dfsg-1
h2osourcebuster2.2.5+dfsg2-2+deb10u1DSA-4508-1
h2osource(unstable)2.2.5+dfsg2-3934886
trafficserversourcewheezy(unfixed)end-of-life
trafficserversourcebuster8.0.2+ds-1+deb10u1DSA-4520-1
trafficserversource(unstable)8.0.5+ds-1934887

Notes

[stretch] - golang-1.8 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[stretch] - golang-1.7 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[jessie] - golang <not-affected> (No HTTP2 support yet)
[buster] - golang-golang-x-net-dev <postponed> (Limited support, minor issue, DoS)
Issue: https://github.com/golang/go/issues/33606
https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
https://github.com/golang/go/commit/7139b45d1410ded14e1e131151fd8dfc435ede6c (golang-1.12)
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
https://github.com/h2o/h2o/issues/2090
https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f

Search for package or bug name: Reporting problems