Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9513

Опубликовано: 13 авг. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 7.8
CVSS3: 7.5

Описание

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

1.39.2-1
disco

ignored

end of life
eoan

not-affected

1.39.2-1
esm-apps/xenial

released

1.7.1-1ubuntu0.1~esm2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.30.0-1ubuntu1+esm2
esm-infra/focal

not-affected

1.39.2-1
focal

not-affected

1.39.2-1

Показывать по

РелизСтатусПримечание
bionic

released

1.14.0-0ubuntu1.4
cosmic

ignored

end of life
devel

released

1.16.1-0ubuntu1
disco

released

1.15.9-0ubuntu1.1
eoan

released

1.16.1-0ubuntu1
esm-infra-legacy/trusty

not-affected

http2 support not implemented
esm-infra/bionic

not-affected

1.14.0-0ubuntu1.4
esm-infra/focal

not-affected

1.16.1-0ubuntu1
esm-infra/xenial

not-affected

1.10.3-0ubuntu0.16.04.4
focal

released

1.16.1-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

not-affected

10.19.0~dfsg-3ubuntu1
esm-apps/jammy

not-affected

12.22.9~dfsg-1ubuntu3
esm-apps/noble

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

not-affected

10.19.0~dfsg-3ubuntu1
groovy

ignored

end of life

Показывать по

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
debian
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
github
около 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

7.8 High

CVSS2

7.5 High

CVSS3