Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8r5v-vm4m-4g25: Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)

An attacker with an HTTP/2 connection to an affected endpoint can send a steady stream of invalid frames to force the generation of reset frames on the victim endpoint. By closing their recv window, the attacker could then force these resets to be queued in an unbounded fashion, resulting in Out Of Memory (OOM) and high CPU usage.

This fix is corrected in hyperium/h2#737, which limits the total number of internal error resets emitted by default before the connection is closed.

ghsa
#vulnerability#dos#git

Package

cargo h2 (Rust)

Affected versions

< 0.3.24

>= 0.4.0, < 0.4.2

Patched versions

0.3.24

0.4.2

Description

An attacker with an HTTP/2 connection to an affected endpoint can send a steady stream of invalid frames to force the
generation of reset frames on the victim endpoint.
By closing their recv window, the attacker could then force these resets to be queued in an unbounded fashion,
resulting in Out Of Memory (OOM) and high CPU usage.

This fix is corrected in hyperium/h2#737, which limits the total number of
internal error resets emitted by default before the connection is closed.

References

  • hyperium/h2#737
  • hyperium/h2@59570e1
  • hyperium/h2@d919cd6
  • https://rustsec.org/advisories/RUSTSEC-2024-0003.html

Published to the GitHub Advisory Database

Jan 19, 2024

Reviewed

Jan 19, 2024

Last updated

Jan 19, 2024

ghsa: Latest News

GHSA-rm76-4mrf-v9r8: vLLM uses Python 3.12 built-in hash() which leads to predictable hash collisions in prefix cache