Описание
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | ignored  | end of standard support, was needed | 
| cosmic | ignored  | end of life | 
| devel | not-affected  | 1.39.2-1 | 
| disco | ignored  | end of life | 
| eoan | not-affected  | 1.39.2-1 | 
| esm-apps/xenial | released  | 1.7.1-1ubuntu0.1~esm2 | 
| esm-infra-legacy/trusty | DNE  | |
| esm-infra/bionic | released  | 1.30.0-1ubuntu1+esm2 | 
| esm-infra/focal | not-affected  | 1.39.2-1 | 
| focal | not-affected  | 1.39.2-1 | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | released  | 1.14.0-0ubuntu1.4 | 
| cosmic | ignored  | end of life | 
| devel | released  | 1.16.1-0ubuntu1 | 
| disco | released  | 1.15.9-0ubuntu1.1 | 
| eoan | released  | 1.16.1-0ubuntu1 | 
| esm-infra-legacy/trusty | not-affected  | http2 support not implemented | 
| esm-infra/bionic | released  | 1.14.0-0ubuntu1.4 | 
| esm-infra/focal | released  | 1.16.1-0ubuntu1 | 
| esm-infra/xenial | released  | 1.10.3-0ubuntu0.16.04.4 | 
| focal | released  | 1.16.1-0ubuntu1 | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | ignored  | end of standard support, was needs-triage | 
| devel | not-affected  | 18.13.0+dfsg1-1ubuntu2 | 
| esm-apps/bionic | ignored  | changes too intrusive | 
| esm-apps/focal | not-affected  | 10.19.0~dfsg-3ubuntu1 | 
| esm-apps/jammy | not-affected  | 12.22.9~dfsg-1ubuntu3 | 
| esm-apps/noble | not-affected  | 18.13.0+dfsg1-1ubuntu2 | 
| esm-apps/xenial | ignored  | changes too intrusive | 
| esm-infra-legacy/trusty | ignored  | changes too intrusive | 
| focal | not-affected  | 10.19.0~dfsg-3ubuntu1 | 
| groovy | ignored  | end of life | 
Показывать по
Ссылки на источники
EPSS
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Some HTTP/2 implementations are vulnerable to resource loops, potentia ...
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
EPSS
7.8 High
CVSS2
7.5 High
CVSS3