priority vulnerable to denial of service
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Aug 30, 2024
Description
Published by the National Vulnerability Database
Jan 10, 2017
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Aug 30, 2024
Last updated
Aug 30, 2024
A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
References