{"id":"UBUNTU-CVE-2019-9513","details":"Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.","modified":"2026-04-22T13:54:44.063997Z","published":"2019-08-13T00:00:00Z","related":["USN-4099-1","USN-6754-1"],"upstream":["CVE-2019-9513"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-9513"},{"type":"REPORT","url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4099-1"},{"type":"REPORT","url":"https://github.com/nodejs/node/pull/29133"},{"type":"REPORT","url":"https://github.com/nodejs/node/pull/29148"},{"type":"REPORT","url":"https://github.com/nodejs/node/pull/29152"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-9513"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6754-1"}],"affected":[{"package":{"name":"nodejs","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/nodejs@0.10.25~dfsg2-2ubuntu1.2+esm2?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.10.15~dfsg1-4","0.10.21~dfsg1-1","0.10.22~dfsg1-2","0.10.23~dfsg1-1","0.10.23~dfsg1-2","0.10.23~dfsg1-3","0.10.24~dfsg1-1","0.10.25~dfsg2-2","0.10.25~dfsg2-2ubuntu1","0.10.25~dfsg2-2ubuntu1.2","0.10.25~dfsg2-2ubuntu1.2+esm1","0.10.25~dfsg2-2ubuntu1.2+esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"0.10.25~dfsg2-2ubuntu1.2+esm2","binary_name":"nodejs"},{"binary_version":"0.10.25~dfsg2-2ubuntu1.2+esm2","binary_name":"nodejs-legacy"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nginx","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.10.3-0ubuntu0.16.04.4?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.3-0ubuntu0.16.04.4"}]}],"versions":["1.9.3-1ubuntu1","1.9.6-2ubuntu1","1.9.6-2ubuntu2","1.9.9-0ubuntu1","1.9.9-1ubuntu1","1.9.10-0ubuntu1","1.9.10-1ubuntu1","1.9.11-0ubuntu1","1.9.11-0ubuntu2","1.9.12-0ubuntu1","1.9.13-0ubuntu1","1.9.14-0ubuntu1","1.9.15-0ubuntu1","1.10.0-0ubuntu0.16.04.1","1.10.0-0ubuntu0.16.04.2","1.10.0-0ubuntu0.16.04.3","1.10.0-0ubuntu0.16.04.4","1.10.3-0ubuntu0.16.04.1","1.10.3-0ubuntu0.16.04.2","1.10.3-0ubuntu0.16.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx"},{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx-common"},{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx-core"},{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx-extras"},{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx-full"},{"binary_version":"1.10.3-0ubuntu0.16.04.4","binary_name":"nginx-light"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nghttp2","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/nghttp2@1.7.1-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.1-1ubuntu0.1~esm2"}]}],"versions":["0.6.7-1","1.3.4-2","1.4.0-1","1.4.0-2","1.5.0-2","1.6.0-1","1.7.0-1","1.7.1-1","1.7.1-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.7.1-1ubuntu0.1~esm2","binary_name":"libnghttp2-14"},{"binary_version":"1.7.1-1ubuntu0.1~esm2","binary_name":"nghttp2"},{"binary_version":"1.7.1-1ubuntu0.1~esm2","binary_name":"nghttp2-client"},{"binary_version":"1.7.1-1ubuntu0.1~esm2","binary_name":"nghttp2-proxy"},{"binary_version":"1.7.1-1ubuntu0.1~esm2","binary_name":"nghttp2-server"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nodejs","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/nodejs@4.2.6~dfsg-1ubuntu4.2+esm3?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.10.25~dfsg2-2ubuntu1","4.2.2~dfsg-1","4.2.3~dfsg-1","4.2.4~dfsg-1ubuntu1","4.2.4~dfsg-2","4.2.6~dfsg-1ubuntu1","4.2.6~dfsg-1ubuntu4","4.2.6~dfsg-1ubuntu4.1","4.2.6~dfsg-1ubuntu4.2","4.2.6~dfsg-1ubuntu4.2+esm1","4.2.6~dfsg-1ubuntu4.2+esm2","4.2.6~dfsg-1ubuntu4.2+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"4.2.6~dfsg-1ubuntu4.2+esm3","binary_name":"nodejs"},{"binary_version":"4.2.6~dfsg-1ubuntu4.2+esm3","binary_name":"nodejs-legacy"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nginx","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.14.0-0ubuntu1.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.14.0-0ubuntu1.4"}]}],"versions":["1.12.1-0ubuntu2","1.13.6-2ubuntu1","1.13.6-2ubuntu2","1.13.10-1ubuntu1","1.13.12-0ubuntu1","1.14.0-0ubuntu1","1.14.0-0ubuntu1.1","1.14.0-0ubuntu1.2","1.14.0-0ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-auth-pam"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-cache-purge"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-dav-ext"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-echo"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-fancyindex"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-geoip"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-headers-more-filter"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-image-filter"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-lua"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-ndk"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-perl"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-subs-filter"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-uploadprogress"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-upstream-fair"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-http-xslt-filter"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-mail"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-nchan"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-rtmp"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"libnginx-mod-stream"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx-common"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx-core"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx-extras"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx-full"},{"binary_version":"1.14.0-0ubuntu1.4","binary_name":"nginx-light"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nghttp2","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/nghttp2@1.30.0-1ubuntu1+esm2?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.30.0-1ubuntu1+esm2"}]}],"versions":["1.25.0-1","1.27.0-1","1.28.0-1","1.29.0-1","1.29.0-1build1","1.30.0-1","1.30.0-1ubuntu1","1.30.0-1ubuntu1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.30.0-1ubuntu1+esm2","binary_name":"libnghttp2-14"},{"binary_version":"1.30.0-1ubuntu1+esm2","binary_name":"nghttp2"},{"binary_version":"1.30.0-1ubuntu1+esm2","binary_name":"nghttp2-client"},{"binary_version":"1.30.0-1ubuntu1+esm2","binary_name":"nghttp2-proxy"},{"binary_version":"1.30.0-1ubuntu1+esm2","binary_name":"nghttp2-server"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}},{"package":{"name":"nodejs","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/nodejs@8.10.0~dfsg-2ubuntu0.4+esm6?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["6.11.4~dfsg-1ubuntu1","6.11.4~dfsg-1ubuntu2","6.12.0~dfsg-1ubuntu1","6.12.0~dfsg-2ubuntu1","6.12.0~dfsg-2ubuntu2","8.10.0~dfsg-2","8.10.0~dfsg-2ubuntu0.2","8.10.0~dfsg-2ubuntu0.3","8.10.0~dfsg-2ubuntu0.4","8.10.0~dfsg-2ubuntu0.4+esm1","8.10.0~dfsg-2ubuntu0.4+esm2","8.10.0~dfsg-2ubuntu0.4+esm3","8.10.0~dfsg-2ubuntu0.4+esm4","8.10.0~dfsg-2ubuntu0.4+esm5","8.10.0~dfsg-2ubuntu0.4+esm6"],"ecosystem_specific":{"binaries":[{"binary_version":"8.10.0~dfsg-2ubuntu0.4+esm6","binary_name":"nodejs"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9513.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}