Unrated severityNVD Advisory· Published Aug 13, 2019· Updated Aug 4, 2024
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service
CVE-2019-9516
Description
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
Affected products
39- HTTP/2/HTTP/2description
- osv-coords38 versionspkg:rpm/almalinux/nginxpkg:rpm/almalinux/nginx-all-modulespkg:rpm/almalinux/nginx-filesystempkg:rpm/almalinux/nginx-mod-http-image-filterpkg:rpm/almalinux/nginx-mod-http-perlpkg:rpm/almalinux/nginx-mod-http-xslt-filterpkg:rpm/almalinux/nginx-mod-mailpkg:rpm/almalinux/nginx-mod-streampkg:rpm/almalinux/nodejs-nodemonpkg:rpm/almalinux/nodejs-packagingpkg:rpm/opensuse/nginx&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nginx&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nginx&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/nodejs10&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nodejs10&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nodejs8&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nodejs8&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/firefox-atk&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-cairo&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gdk-pixbuf&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-glib2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-harfbuzz&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi-gcc5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-pango&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/nginx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/nginx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1
< 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma+ 37 more
- (no CPE)range: < 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1.18.3-1.module_el8.3.0+2023+d2377ea3
- (no CPE)range: < 17-3.module_el8.4.0+2224+b07ac28e
- (no CPE)range: < 1.14.2-lp150.2.11.1
- (no CPE)range: < 1.14.2-lp151.4.3.1
- (no CPE)range: < 1.21.3-1.4
- (no CPE)range: < 10.16.3-lp151.2.6.1
- (no CPE)range: < 10.16.3-lp151.2.6.1
- (no CPE)range: < 8.16.1-lp151.2.6.1
- (no CPE)range: < 8.16.1-lp151.2.6.1
- (no CPE)range: < 2.26.1-2.8.4
- (no CPE)range: < 1.15.10-2.13.4
- (no CPE)range: < 2.36.11-2.8.4
- (no CPE)range: < 2.54.3-2.14.7
- (no CPE)range: < 3.10.9-2.15.3
- (no CPE)range: < 1.7.5-2.7.4
- (no CPE)range: < 3.2.1.git259-2.3.3
- (no CPE)range: < 5.3.1+r233831-14.1
- (no CPE)range: < 1.40.14-2.7.4
- (no CPE)range: < 68-21.9.8
- (no CPE)range: < 68.2.0-78.51.4
- (no CPE)range: < 4.21-29.6.1
- (no CPE)range: < 3.45-38.9.3
- (no CPE)range: < 1.14.2-3.6.1
- (no CPE)range: < 1.14.2-6.3.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 12.13.0-1.3.1
- (no CPE)range: < 8.16.1-3.20.1
- (no CPE)range: < 8.16.1-3.20.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
37- lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2019:2745mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2746mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2775mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2799mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2925mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2939mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2946mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2950mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2955mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2966mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3932mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3933mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3935mitrevendor-advisoryx_refsource_REDHAT
- kb.cert.org/vuls/id/605641/mitrethird-party-advisoryx_refsource_CERT-VN
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/mitrevendor-advisoryx_refsource_FEDORA
- usn.ubuntu.com/4099-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4505mitrevendor-advisoryx_refsource_DEBIAN
- seclists.org/fulldisclosure/2019/Aug/16mitremailing-listx_refsource_FULLDISC
- github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.mdmitrex_refsource_MISC
- kc.mcafee.com/corporate/indexmitrex_refsource_CONFIRM
- seclists.org/bugtraq/2019/Aug/24mitremailing-listx_refsource_BUGTRAQ
- seclists.org/bugtraq/2019/Aug/40mitremailing-listx_refsource_BUGTRAQ
- security.netapp.com/advisory/ntap-20190823-0002/mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20190823-0005/mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K02591030mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K02591030mitrex_refsource_CONFIRM
- www.synology.com/security/advisory/Synology_SA_19_33mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.