An attacker can send a flood of CONTINUATION frames, causing h2 to process them indefinitely. This results in an increase in CPU usage.
Tokio task budget helps prevent this from a complete denial-of-service, as the server can still respond to legitimate requests, albeit with increased latency.
More details at https://seanmonstar.com/blog/hyper-http2-continuation-flood/.
Patches available for 0.4.x and 0.3.x versions.
{
"github_reviewed_at": "2024-04-05T15:05:32Z",
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": null,
"cwe_ids": [
"CWE-400",
"CWE-770"
]
}