Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ort: [RUSTSEC-2023-0034] Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) #219

Open
github-actions bot opened this issue Apr 21, 2023 · 0 comments
Labels
rust Pull requests that update Rust code security

Comments

@github-actions
Copy link

If an attacker is able to flood the network with pairs of HEADERS/RST_STREAM frames, such that the h2 application is not able to accept them faster than the bytes are received, the pending accept queue can grow in memory usage. Being able to do this consistently can result in excessive memory use, and eventually trigger Out Of Memory.

This flaw is corrected in hyperium/h2#668, which restricts remote reset stream count by default.

@github-actions github-actions bot added rust Pull requests that update Rust code security labels Apr 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
rust Pull requests that update Rust code security
Projects
None yet
Development

No branches or pull requests

0 participants