GHSA-8r5v-vm4m-4g25

Suggest an improvement
Source
https://github.com/advisories/GHSA-8r5v-vm4m-4g25
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-8r5v-vm4m-4g25/GHSA-8r5v-vm4m-4g25.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8r5v-vm4m-4g25
Aliases
Related
Published
2024-01-19T15:24:56Z
Modified
2024-02-10T16:11:56.014973Z
Summary
Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)
Details

An attacker with an HTTP/2 connection to an affected endpoint can send a steady stream of invalid frames to force the generation of reset frames on the victim endpoint. By closing their recv window, the attacker could then force these resets to be queued in an unbounded fashion, resulting in Out Of Memory (OOM) and high CPU usage.

This fix is corrected in hyperium/h2#737, which limits the total number of internal error resets emitted by default before the connection is closed.

References

Affected packages

crates.io / h2

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.24

crates.io / h2

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.4.0
Fixed
0.4.2