CVE-2019-9511

Published: 13 August 2019

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
nghttp2
Launchpad, Ubuntu, Debian
Upstream
Released (1.39.2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.39.2-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.39.2-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Binaries built from this source package are in Universe and so are supported by the community.
nginx
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo)
Released (1.16.1-0ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1.16.1-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.14.0-0ubuntu1.4)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.10.3-0ubuntu0.16.04.4)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(http2 support not implemented)
Patches:
Upstream: https://github.com/nginx/nginx/commit/94c5eb142e58a86f81eb1369fa6fcb96c2f23d6b
nodejs
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Needs triage

Ubuntu 20.04 LTS (Focal Fossa) Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

Notes

AuthorNote
sbeattie
nginx added http2 support in 1.9.5
nghttp2: nghttpd and nghttp are affected, libnghttp2 is not
mdeslaur
nghttp2-server is in universe

References