First published: Tue Aug 13 2019(Updated: )
A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.29-41.jbcs.el6 | 0:2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-1.jbcs.el6 | 0:1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el6 | 0:1.6.3-63.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el6 | 0:1.6.1-48.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el6 | 0:1.0.6-7.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el6 | 0:7.64.1-14.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el6 | 0:2.4.37-33.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el6 | 0:2.11-20.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el6 | 0:1.39.2-4.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el6 | 1:1.1.1-25.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-41.jbcs.el7 | 0:2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-1.jbcs.el7 | 0:1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el7 | 0:1.6.3-63.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el7 | 0:1.6.1-48.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el7 | 0:1.0.6-7.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el7 | 0:7.64.1-14.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el7 | 0:2.4.37-33.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el7 | 0:2.11-20.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el7 | 0:1.39.2-4.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el7 | 1:1.1.1-25.jbcs.el7 |
redhat/rh-nginx110-nginx | <1:1.10.2-9.el6.1 | 1:1.10.2-9.el6.1 |
redhat/rh-nginx110-nginx | <1:1.10.2-9.el7.1 | 1:1.10.2-9.el7.1 |
redhat/rh-nginx112-nginx | <1:1.12.1-3.el7.1 | 1:1.12.1-3.el7.1 |
redhat/rh-nginx114-nginx | <1:1.14.1-1.el7.1 | 1:1.14.1-1.el7.1 |
redhat/rh-nodejs10 | <0:3.2-3.el7 | 0:3.2-3.el7 |
redhat/rh-nodejs10-nodejs | <0:10.16.3-3.el7 | 0:10.16.3-3.el7 |
redhat/rh-nodejs8 | <0:3.0-5.el7 | 0:3.0-5.el7 |
redhat/rh-nodejs8-nodejs | <0:8.16.1-2.el7 | 0:8.16.1-2.el7 |
redhat/Nodejs | <8.16.1 | 8.16.1 |
redhat/Nodejs | <10.16.3 | 10.16.3 |
redhat/Nodejs | <12.8.1 | 12.8.1 |
redhat/nginx | <1.16.1 | 1.16.1 |
redhat/nginx | <1.17.3 | 1.17.3 |
All of | ||
Apple Swiftnio | >=1.0.0<=1.4.0 | |
Any of | ||
Apple Mac OS X | >=10.12 | |
Canonical Ubuntu Linux | >=14.04 | |
Apache Traffic Server | >=6.0.0<=6.2.3 | |
Apache Traffic Server | >=7.0.0<=7.1.6 | |
Apache Traffic Server | >=8.0.0<=8.0.3 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Synology DiskStation Manager | =6.2 | |
Synology Skynas | ||
All of | ||
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Jboss Core Services | =1.0 | |
Redhat Jboss Enterprise Application Platform | =7.2.0 | |
Redhat Jboss Enterprise Application Platform | =7.3.0 | |
Redhat Openshift Service Mesh | =1.0 | |
Redhat Quay | =3.0.0 | |
Redhat Software Collections | =1.0 | |
Redhat Enterprise Linux | =8.0 | |
Oracle GraalVM | =19.2.0 | |
McAfee Web Gateway | >=7.7.2.0<7.7.2.24 | |
McAfee Web Gateway | >=7.8.2.0<7.8.2.13 | |
McAfee Web Gateway | >=8.1.0<8.2.0 | |
F5 Nginx | >=1.9.5<1.16.1 | |
F5 Nginx | >=1.17.0<=1.17.2 | |
Nodejs Node.js | >=8.0.0<8.16.1 | |
Nodejs Node.js | >=10.0.0<10.16.3 | |
Nodejs Node.js | >=12.0.0<12.8.1 | |
Apple Swiftnio | >=1.0.0<=1.4.0 | |
Apple Mac OS X | >=10.12 | |
Canonical Ubuntu Linux | >=14.04 | |
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
debian/nginx | 1.18.0-6.1+deb11u3 1.22.1-9 1.26.0-3 |
Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions: 1. Copy the Nginx configuration from the quay container to the host $ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx 2. Edit the Nginx configuration, removing http/2 support $ sed -i 's/http2 //g' /mnt/quay/nginx/nginx.conf 3. Restart Nginx with the new configuration mounted into the container, eg: $ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-9516 is a vulnerability in HTTP/2 that allows an attacker to cause a denial of service.
CVE-2019-9516 works by sending a stream of headers with 0-length header names and values, potentially causing a header leak and leading to a denial of service.
Node.js versions up to 8.16.1, 10.16.3, and 12.8.1, as well as Nginx versions 1.16.1 and 1.17.3 are affected by CVE-2019-9516.
CVE-2019-9516 has a severity rating of high, with a CVSS score of 6.5.
Yes, you can find references for CVE-2019-9516 in the following links: [link1], [link2], [link3].