CVE-2019-9516

Publication date 13 August 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

Read the notes from the security team

Status

Package Ubuntu Release Status
nginx 19.04 disco
Fixed 1.15.9-0ubuntu1.1
18.10 cosmic Ignored end of life, was needed
18.04 LTS bionic
Fixed 1.14.0-0ubuntu1.4
16.04 LTS xenial
Fixed 1.10.3-0ubuntu0.16.04.4
14.04 LTS trusty
Not affected

Notes


sbeattie

nginx added http2 support in 1.9.5

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
nginx

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H