Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "8.0.5+ds-2", "binary_name": "trafficserver" }, { "binary_version": "8.0.5+ds-2", "binary_name": "trafficserver-dbgsym" }, { "binary_version": "8.0.5+ds-2", "binary_name": "trafficserver-dev" }, { "binary_version": "8.0.5+ds-2", "binary_name": "trafficserver-experimental-plugins" }, { "binary_version": "8.0.5+ds-2", "binary_name": "trafficserver-experimental-plugins-dbgsym" } ] }