ALT-PU-2019-2564-1
Closed vulnerabilities
BDU:2019-02995
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02996
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12452
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request.
Modified: 2024-11-21
CVE-2019-9512
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K98053339
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K98053339
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2000
Modified: 2025-01-14
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K01988340
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- DSA-4669
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4669
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K01988340
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056