Alpaquita Linux
Security Advisory

CVE-2019-9512

Published: August 31, 2023Last modified: August 31, 2023

Description

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Severity score breakdown

ParameterValue
Base score7.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTScontainerdNot affected (1.6.18-r2)
goNot affected (1.19.9-r1)
nodejsNot affected (18.17.1-r0)
py3-twistedNot affected (22.10.0-r1)
StreamcontainerdNot affected (1.7.5-r0)
goNot affected (1.21.0-r2)
nodejsNot affected (18.17.1-r0)
py3-twistedNot affected (22.10.0-r3)

References

ON THIS PAGE