Source: rust-h2
Severity: important
X-Debbugs-Cc: alexander.kj...@gmail.com

Dear Maintainer,

An attacker with an HTTP/2 connection to an affected endpoint can send 
a steady stream of invalid frames to force the generation of reset frames 
on the victim endpoint. By closing their recv window, the attacker could 
then force these resets to be queued in an unbounded fashion, resulting 
in Out Of Memory (OOM) and high CPU usage.

This fix is corrected in hyperium/h2#737, which limits the total number 
of internal error resets emitted by default before the connection is 
closed.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.11-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to