CVE-2019-9518

Priority
Description
Some HTTP/2 implementations are vulnerable to a flood of empty frames,
potentially leading to a denial of service. The attacker sends a stream of
frames with an empty payload and without the end-of-stream flag. These
frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer
spends time processing each frame disproportionate to attack bandwidth.
This can consume excess CPU.
Notes
Package
Source: netty (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not preent)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):needed
Ubuntu 19.10 (Eoan):needed
More Information

Updated: 2019-10-18 02:48:39 UTC (commit cccfc4426d8c1fbf582a89d981fe7fc812124543)