Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service
Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2019-9514 describes an HTTP/2 reset flood vulnerability that can cause denial of service by exhausting memory and CPU resources.
Vulnerability
Overview
CVE-2019-9514 is an HTTP/2 vulnerability that allows an attacker to cause a denial of service via a reset flood. The attacker opens multiple streams and sends invalid requests that elicit RST_STREAM frames from the peer. If the peer queues these frames inefficiently, it can lead to excessive memory and CPU consumption [2].
Exploitation
Mechanism
The attack leverages the HTTP/2 protocol's stream management. By sending a large number of invalid requests, the attacker forces the server to generate and handle many RST_STREAM frames. Depending on how the implementation queues these frames, the server's resources can be overwhelmed [2]. This attack does not require authentication and can be launched over a network.
Impact
Successful exploitation results in a denial of service, making the affected service unresponsive or crash. Red Hat rated this vulnerability as Important severity, as it can impact critical infrastructure [2]. The vulnerability affects multiple products including Undertow and Node.js.
Mitigation
Red Hat has released patches for affected products such as JBoss Enterprise Application Platform (via RHSA-2019:4019 [2]), and various container tools (via RHSA-2019:4273 [1], RHSA-2019:4269 [3]). Additionally, Node.js was patched in RHSA-2019:2925 [4]. Administrators should apply the recommended updates to mitigate the risk.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
golang.org/x/netGo | < 0.0.0-20190813141303-74dc4d7220e7 | 0.0.0-20190813141303-74dc4d7220e7 |
Affected products
38- HTTP/2/HTTP/2description
- osv-coords37 versionspkg:apk/chainguard/heypkg:apk/chainguard/k3dpkg:apk/chainguard/k3d-proxypkg:apk/chainguard/k3d-toolspkg:apk/wolfi/heypkg:apk/wolfi/k3dpkg:apk/wolfi/k3d-proxypkg:apk/wolfi/k3d-toolspkg:golang/golang.org/x/netpkg:rpm/almalinux/containernetworking-pluginspkg:rpm/almalinux/containers-commonpkg:rpm/almalinux/fuse-overlayfspkg:rpm/almalinux/nodejs-nodemonpkg:rpm/almalinux/nodejs-packagingpkg:rpm/almalinux/oci-systemd-hookpkg:rpm/almalinux/oci-umountpkg:rpm/almalinux/runcpkg:rpm/almalinux/skopeopkg:rpm/suse/firefox-atk&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-cairo&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gdk-pixbuf&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-glib2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-harfbuzz&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi-gcc5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-pango&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1
< 0.1.4-r3+ 36 more
- (no CPE)range: < 0.1.4-r3
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 0.1.4-r3
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 0.0.0-20190813141303-74dc4d7220e7
- (no CPE)range: < 0.7.4-4.git9ebe139.module_el8.3.0+2044+12421f43
- (no CPE)range: < 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43
- (no CPE)range: < 0.3-5.module_el8.3.0+2044+12421f43
- (no CPE)range: < 1.18.3-1.module_el8.3.0+2023+d2377ea3
- (no CPE)range: < 17-3.module_el8.4.0+2224+b07ac28e
- (no CPE)range: < 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082
- (no CPE)range: < 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082
- (no CPE)range: < 1.0.0-56.rc5.dev.git2abd837.module_el8.3.0+2044+12421f43
- (no CPE)range: < 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43
- (no CPE)range: < 2.26.1-2.8.4
- (no CPE)range: < 1.15.10-2.13.4
- (no CPE)range: < 2.36.11-2.8.4
- (no CPE)range: < 2.54.3-2.14.7
- (no CPE)range: < 3.10.9-2.15.3
- (no CPE)range: < 1.7.5-2.7.4
- (no CPE)range: < 3.2.1.git259-2.3.3
- (no CPE)range: < 5.3.1+r233831-14.1
- (no CPE)range: < 1.40.14-2.7.4
- (no CPE)range: < 68-21.9.8
- (no CPE)range: < 68.2.0-78.51.4
- (no CPE)range: < 4.21-29.6.1
- (no CPE)range: < 3.45-38.9.3
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 12.13.0-1.3.1
- (no CPE)range: < 8.16.1-3.20.1
- (no CPE)range: < 8.16.1-3.20.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
87- lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.htmlghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2594ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2661ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2682ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2690ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2726ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2766ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2769ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2796ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2861ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2925ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2939ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2955ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2966ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3131ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3245ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3265ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3892ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3906ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4018ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4019ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4020ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4021ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4040ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4041ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4042ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4045ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4269ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4273ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:4352ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2020:0406ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2020:0727ghsavendor-advisoryWEB
- github.com/advisories/GHSA-39qc-96h7-956fghsaADVISORY
- kb.cert.org/vuls/id/605641/mitrethird-party-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2019-9514ghsaADVISORY
- usn.ubuntu.com/4308-1/mitrevendor-advisory
- www.debian.org/security/2019/dsa-4503ghsavendor-advisoryWEB
- www.debian.org/security/2019/dsa-4508ghsavendor-advisoryWEB
- www.debian.org/security/2019/dsa-4520ghsavendor-advisoryWEB
- www.debian.org/security/2020/dsa-4669ghsavendor-advisoryWEB
- seclists.org/fulldisclosure/2019/Aug/16ghsamailing-listWEB
- www.openwall.com/lists/oss-security/2019/08/20/1ghsamailing-listWEB
- www.openwall.com/lists/oss-security/2023/10/18/8ghsamailing-listWEB
- github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.mdghsaWEB
- go.dev/cl/190137ghsaWEB
- go.dev/issue/33606ghsaWEB
- go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5ghsaWEB
- groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJghsaWEB
- kb.cert.org/vuls/id/605641ghsaWEB
- kc.mcafee.com/corporate/indexghsaWEB
- lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3EghsaWEB
- lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3EghsaWEB
- lists.debian.org/debian-lts-announce/2020/12/msg00011.htmlghsamailing-listWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMCghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXPghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQghsaWEB
- pkg.go.dev/vuln/GO-2022-0536ghsaWEB
- seclists.org/bugtraq/2019/Aug/24ghsamailing-listWEB
- seclists.org/bugtraq/2019/Aug/31ghsamailing-listWEB
- seclists.org/bugtraq/2019/Aug/43ghsamailing-listWEB
- seclists.org/bugtraq/2019/Sep/18ghsamailing-listWEB
- security.netapp.com/advisory/ntap-20190823-0001ghsaWEB
- security.netapp.com/advisory/ntap-20190823-0004ghsaWEB
- security.netapp.com/advisory/ntap-20190823-0005ghsaWEB
- support.f5.com/csp/article/K01988340ghsaWEB
- support.f5.com/csp/article/K01988340ghsaWEB
- usn.ubuntu.com/4308-1ghsaWEB
- www.synology.com/security/advisory/Synology_SA_19_33ghsaWEB
- security.netapp.com/advisory/ntap-20190823-0001/mitre
- security.netapp.com/advisory/ntap-20190823-0004/mitre
- security.netapp.com/advisory/ntap-20190823-0005/mitre
- support.f5.com/csp/article/K01988340mitre
News mentions
0No linked articles in our index yet.