{"id":"AZL-38449","summary":"CVE-2019-9512 affecting package python-tensorboard for versions less than 2.16.2-1","details":"Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.","modified":"2026-04-01T05:13:19.043041Z","published":"2019-08-13T21:15:12Z","upstream":["CVE-2019-9512"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9512"}],"affected":[{"package":{"name":"python-tensorboard","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/python-tensorboard"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.2-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-38449.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}