First published: Tue Jan 10 2017(Updated: )
A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/priority | >=0<1.2.0 | 1.2.0 |
Python Priority Library | =1.0.0 | |
Python Priority Library | =1.1.0 | |
Python Priority Library | =1.1.1 | |
=1.0.0 | ||
=1.1.0 | ||
=1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6580 is considered a medium severity vulnerability due to its potential impact on application performance and stability.
To fix CVE-2016-6580, update the Python priority library to version 1.2.0 or later.
CVE-2016-6580 affects all versions of the Python priority library prior to 1.2.0.
Yes, CVE-2016-6580 can potentially be exploited by a malicious peer over the network.
Failing to address CVE-2016-6580 may lead to degraded application performance and possible denial of service.