Safety vulnerability ID: 42335
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Priority 1.2.0 includes a fix for CVE-2016-6580: A HTTP/2 implementation built using any version of the python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
Latest version: 2.0.0
A pure-Python implementation of the HTTP/2 priority tree
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application