CVE-2019-9518

Priority
Description
Some HTTP/2 implementations are vulnerable to a flood of empty frames,
potentially leading to a denial of service. The attacker sends a stream of
frames with an empty payload and without the end-of-stream flag. These
frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer
spends time processing each frame disproportionate to attack bandwidth.
This can consume excess CPU.
Ubuntu-Description
It was discovered that Netty incorrectly implements HTTP/2. An attacker could
possibly use this issue to cause a denial of service.
Notes
Package
Source: netty (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not preent)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):needed
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):not-affected (8.0.5+ds-3)
Ubuntu 20.10 (Groovy Gorilla):needs-triage
More Information

Updated: 2020-10-28 16:51:15 UTC (commit 61c466688be673cb43da2af6d4295f1a01fd7ad1)