H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "h2o" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "h2o-dbgsym" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "h2o-doc" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o-dev" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o-dev-common" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o-evloop-dev" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o-evloop0.13" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o-evloop0.13-dbgsym" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o0.13" }, { "binary_version": "2.2.4+dfsg-1build1", "binary_name": "libh2o0.13-dbgsym" } ] }