libnghttp2.so is vulnerable to Denial Of Service (DoS). An attacker can send an overly large HTTP/2 SETTINGS frames with a length of 14,400 bytes (2400 individual settings entries) over and over again, causing 100% CPU usage and eventually crash.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
lists.debian.org/debian-lts-announce/2021/10/msg00011.html
lists.fedoraproject.org/archives/list/[email protected]/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
lists.fedoraproject.org/archives/list/[email protected]/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
www.debian.org/security/2020/dsa-4696
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujan2021.html
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/security-alerts/cpuoct2020.html