H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header.
{ "binaries": [ { "binary_name": "h2o", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "h2o-dbgsym", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "h2o-doc", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o-dev", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o-dev-common", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o-evloop-dev", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o-evloop0.13", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o-evloop0.13-dbgsym", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o0.13", "binary_version": "2.2.4+dfsg-1build1" }, { "binary_name": "libh2o0.13-dbgsym", "binary_version": "2.2.4+dfsg-1build1" } ], "availability": "No subscription required" }