Name | CVE-2019-9514 |
Description | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2485-1, DSA-4503-1, DSA-4508-1, DSA-4520-1, DSA-4669-1 |
Debian Bugs | 934885, 934886, 934887, 934955, 1062667 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
golang (PTS) | jessie, jessie (lts) | 2:1.3.3-1+deb8u5 | fixed |
golang-1.11 (PTS) | buster | 1.11.6-1+deb10u4 | fixed |
| buster (security) | 1.11.6-1+deb10u7 | fixed |
golang-1.7 (PTS) | stretch (security), stretch (lts), stretch | 1.7.4-2+deb9u5 | vulnerable |
golang-1.8 (PTS) | stretch (security), stretch (lts), stretch | 1.8.1-1+deb9u5 | vulnerable |
golang-golang-x-net-dev (PTS) | stretch (security), stretch (lts), stretch | 1:0.0+git20161013.8b4af36+dfsg-3+deb9u1 | fixed |
| buster | 1:0.0+git20181201.351d144+dfsg-3 | vulnerable |
h2o (PTS) | buster | 2.2.5+dfsg2-2+deb10u1 | fixed |
| buster (security) | 2.2.5+dfsg2-2+deb10u2 | fixed |
| bullseye | 2.2.5+dfsg2-6 | fixed |
| bookworm | 2.2.5+dfsg2-7 | fixed |
| trixie | 2.2.5+dfsg2-8 | fixed |
| sid | 2.2.5+dfsg2-8.1 | fixed |
nodejs (PTS) | jessie | 0.10.29~dfsg-2 | fixed |
| stretch | 4.8.2~dfsg-1 | fixed |
| buster | 10.24.0~dfsg-1~deb10u1 | fixed |
| buster (security) | 10.24.0~dfsg-1~deb10u4 | fixed |
| bullseye (security), bullseye | 12.22.12~dfsg-1~deb11u4 | fixed |
| bookworm | 18.13.0+dfsg1-1 | fixed |
| bookworm (security) | 18.19.0+dfsg-6~deb12u1 | fixed |
| trixie | 18.19.1+dfsg-3 | fixed |
| sid | 18.20.1+dfsg-4 | fixed |
rust-h2 (PTS) | buster | 0.1.16-1 | vulnerable |
| bookworm | 0.3.13-2 | vulnerable |
| sid, trixie | 0.4.4-1 | fixed |
trafficserver (PTS) | buster | 8.0.2+ds-1+deb10u6 | fixed |
| buster (security) | 8.1.7-0+deb10u3 | fixed |
| bullseye | 8.1.9+ds-1~deb11u1 | fixed |
| bullseye (security) | 8.1.10+ds-1~deb11u1 | fixed |
| bookworm | 9.2.3+ds-1+deb12u1 | fixed |
| bookworm (security) | 9.2.4+ds-0+deb12u1 | fixed |
| sid | 9.2.4+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - golang-1.8 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[stretch] - golang-1.7 <ignored> (Minor issue, DoS, invasive, net/http server-side, requires rebuilding reverse-dependencies)
[jessie] - golang <not-affected> (No HTTP2 support yet)
[buster] - golang-golang-x-net-dev <no-dsa> (Limited support, minor issue, DoS)
[stretch] - nodejs <not-affected> (No HTTP2 support yet)
[jessie] - nodejs <not-affected> (No HTTP2 support yet)
[bookworm] - rust-h2 <no-dsa> (Minor issue)
[buster] - rust-h2 <no-dsa> (Minor issue)
Issue: https://github.com/golang/go/issues/33606
https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)
https://github.com/golang/go/commit/7139b45d1410ded14e1e131151fd8dfc435ede6c (golang-1.12)
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4
https://github.com/h2o/h2o/issues/2090
https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f
https://rustsec.org/advisories/RUSTSEC-2024-0003.html
https://github.com/hyperium/h2/pull/737