Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "trafficserver": "8.0.5+ds-2", "trafficserver-dbgsym": "8.0.5+ds-2", "trafficserver-experimental-plugins": "8.0.5+ds-2", "trafficserver-experimental-plugins-dbgsym": "8.0.5+ds-2", "trafficserver-dev": "8.0.5+ds-2" } ] }