Loading
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Use CWE-400, Apple vendor hub and Swiftnio product page to widen CVE-2019-9513 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-4281, CVE-2022-3215 and CVE-2019-9518 for nearby disclosures in the same product family.