Описание
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 1.39.2-1 |
| disco | ignored | end of life |
| eoan | not-affected | 1.39.2-1 |
| esm-apps/xenial | released | 1.7.1-1ubuntu0.1~esm2 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 1.30.0-1ubuntu1+esm2 |
| esm-infra/focal | not-affected | 1.39.2-1 |
| focal | not-affected | 1.39.2-1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.14.0-0ubuntu1.4 |
| cosmic | ignored | end of life |
| devel | released | 1.16.1-0ubuntu1 |
| disco | released | 1.15.9-0ubuntu1.1 |
| eoan | released | 1.16.1-0ubuntu1 |
| esm-infra-legacy/trusty | not-affected | http2 support not implemented |
| esm-infra/bionic | released | 1.14.0-0ubuntu1.4 |
| esm-infra/focal | released | 1.16.1-0ubuntu1 |
| esm-infra/xenial | released | 1.10.3-0ubuntu0.16.04.4 |
| focal | released | 1.16.1-0ubuntu1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 18.13.0+dfsg1-1ubuntu2 |
| esm-apps/bionic | ignored | changes too intrusive |
| esm-apps/focal | not-affected | 10.19.0~dfsg-3ubuntu1 |
| esm-apps/jammy | not-affected | 12.22.9~dfsg-1ubuntu3 |
| esm-apps/noble | not-affected | 18.13.0+dfsg1-1ubuntu2 |
| esm-apps/xenial | ignored | changes too intrusive |
| esm-infra-legacy/trusty | ignored | changes too intrusive |
| focal | not-affected | 10.19.0~dfsg-3ubuntu1 |
| groovy | ignored | end of life |
Показывать по
Ссылки на источники
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Some HTTP/2 implementations are vulnerable to window size manipulation ...
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
7.8 High
CVSS2
7.5 High
CVSS3