GHSA-39qc-96h7-956f

Source
https://github.com/advisories/GHSA-39qc-96h7-956f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-39qc-96h7-956f/GHSA-39qc-96h7-956f.json
Aliases
Published
2022-05-24T16:53:19Z
Modified
2023-11-08T04:01:47.101318Z
Details

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RSTSTREAM frames from the peer. Depending on how the peer queues the RSTSTREAM frames, this can consume excess memory, CPU, or both.

Specific Go Packages Affected

golang.org/x/net/http2

References

Affected packages

Go / golang.org/x/net

Package

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
0.0.0-20190813141303-74dc4d7220e7