Name | CVE-2019-9514 |
Description | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2485-1, DSA-4503-1, DSA-4508-1, DSA-4520-1, DSA-4669-1 |
Debian Bugs | 934885, 934886, 934887, 934955, 1062667 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
golang (PTS) | jessie, jessie (lts) | 2:1.3.3-1+deb8u5 | fixed |
golang-1.11 (PTS) | buster (security), buster, buster (lts) | 1.11.6-1+deb10u7 | fixed |
golang-1.7 (PTS) | stretch (security), stretch (lts), stretch | 1.7.4-2+deb9u5 | vulnerable |
golang-1.8 (PTS) | stretch (security), stretch (lts), stretch | 1.8.1-1+deb9u5 | vulnerable |
golang-golang-x-net-dev (PTS) | stretch (security), stretch (lts), stretch | 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 | fixed |
buster | 1:0.0+git20181201.351d144+dfsg-3 | vulnerable | |
h2o (PTS) | buster (security), buster, buster (lts) | 2.2.5+dfsg2-2+deb10u2 | fixed |
bullseye | 2.2.5+dfsg2-6 | fixed | |
bookworm | 2.2.5+dfsg2-7 | fixed | |
sid, trixie | 2.2.5+dfsg2-9 | fixed | |
nodejs (PTS) | jessie | 0.10.29~dfsg-2 | fixed |
stretch | 4.8.2~dfsg-1 | fixed | |
buster (security), buster, buster (lts) | 10.24.0~dfsg-1~deb10u4 | fixed | |
bullseye | 12.22.12~dfsg-1~deb11u4 | fixed | |
bullseye (security) | 12.22.12~dfsg-1~deb11u5 | fixed | |
bookworm | 18.19.0+dfsg-6~deb12u2 | fixed | |
bookworm (security) | 18.19.0+dfsg-6~deb12u1 | fixed | |
sid, trixie | 20.17.0+dfsg-2 | fixed | |
rust-h2 (PTS) | buster | 0.1.16-1 | vulnerable |
bookworm | 0.3.13-2 | vulnerable | |
sid, trixie | 0.4.4-1 | fixed | |
trafficserver (PTS) | buster (security), buster, buster (lts) | 8.1.7-0+deb10u4 | fixed |
bullseye | 8.1.10+ds-1~deb11u1 | fixed | |
bullseye (security) | 8.1.11+ds-0+deb11u1 | fixed | |
bookworm | 9.2.4+ds-0+deb12u1 | fixed | |
bookworm (security) | 9.2.5+ds-0+deb12u1 | fixed | |
sid | 9.2.5+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
golang | source | wheezy | (unfixed) | end-of-life | ||
golang | source | jessie | (not affected) | |||
golang | source | (unstable) | (unfixed) | |||
golang-1.11 | source | buster | 1.11.6-1+deb10u1 | DSA-4503-1 | ||
golang-1.11 | source | (unstable) | 1.11.13-1 | |||
golang-1.12 | source | (unstable) | 1.12.8-1 | |||
golang-1.13 | source | (unstable) | 1.13~beta1-3 | 934955 | ||
golang-1.7 | source | (unstable) | (unfixed) | |||
golang-1.8 | source | (unstable) | (unfixed) | |||
golang-golang-x-net-dev | source | stretch | 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 | DLA-2485-1 | ||
golang-golang-x-net-dev | source | (unstable) | 1:0.0+git20190811.74dc4d7+dfsg-1 | |||
h2o | source | buster | 2.2.5+dfsg2-2+deb10u1 | DSA-4508-1 | ||
h2o | source | (unstable) | 2.2.5+dfsg2-3 | 934886 | ||
nodejs | source | jessie | (not affected) | |||
nodejs | source | stretch | (not affected) | |||
nodejs | source | buster | 10.19.0~dfsg1-1 | DSA-4669-1 | ||
nodejs | source | (unstable) | 10.16.3~dfsg-1 | 934885 | ||
rust-h2 | source | (unstable) | 0.3.24-1 | 1062667 | ||
trafficserver | source | wheezy | (unfixed) | end-of-life | ||
trafficserver | source | buster | 8.0.2+ds-1+deb10u1 | DSA-4520-1 | ||
trafficserver | source | (unstable) | 8.0.5+ds-1 | 934887 |
[stretch] - golang-1.8 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[stretch] - golang-1.7 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[jessie] - golang <not-affected> (No HTTP2 support yet)
[buster] - golang-golang-x-net-dev <no-dsa> (Limited support, minor issue, DoS)
[stretch] - nodejs <not-affected> (No HTTP2 support yet)
[jessie] - nodejs <not-affected> (No HTTP2 support yet)
[bookworm] - rust-h2 <no-dsa> (Minor issue)
[buster] - rust-h2 <no-dsa> (Minor issue)
Issue: https://github.com/golang/go/issues/33606
https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
https://github.com/golang/go/commit/7139b45d1410ded14e1e131151fd8dfc435ede6c (golang-1.12)
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
https://github.com/h2o/h2o/issues/2090
https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f
https://rustsec.org/advisories/RUSTSEC-2024-0003.html
https://github.com/hyperium/h2/pull/737