ALPINE-CVE-2019-9514 PUBLISHED CVSS 7.5 HIGH

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

Risk Scores

CVSS v3.1
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products

VendorProductVersions
Alpine:v3.9nodejs8.9.4-r0, 10.14.0-r0, 10.14.1-r0
Alpine:v3.16nodejs0, 8.9.4-r0, 8.9.3-r1
Alpine:v3.13nodejs6.10.1-r0, 0, 10.13.0-r0
Alpine:v3.22nodejs0, 0, 0
Alpine:v3.10nodejs10.15.1-r0, 8.9.4-r0, 8.9.3-r1
Alpine:v3.23nodejs0, 0, 0
Alpine:v3.18nodejs0, 8.11.1-r2, 8.11.2-r0
Alpine:v3.20nodejs6.9.2-r0, 0, 10.13.0-r0
Alpine:v3.11nodejs6.11.2-r0, 8.9.4-r0, 0
Alpine:v3.19nodejs10.13.0-r0, 8.9.4-r0, 8.9.3-r1
Alpine:v3.15nodejs8.9.4-r0, 10.13.0-r0, 10.14.0-r0
Alpine:v3.21nodejs0, 0, 0
Alpine:v3.12nodejs8.10.0-r0, 8.11.0-r0, 8.11.0-r1
Alpine:v3.14nodejs4.4.5-r0, 10.13.0-r0, 10.14.0-r0
Alpine:v3.17nodejs8.9.4-r0, 0, 10.14.0-r0

Timeline

References

Open in Interactive Console →