[Pkg-rust-maintainers] Bug#1062667: rust-h2: Resource exhaustion vulnerability in h2 may lead to Denial of Service
Alexander Kjäll
alexander.kjall at gmail.com
Fri Feb 2 15:21:52 GMT 2024
Source: rust-h2
Severity: important
X-Debbugs-Cc: alexander.kjall at gmail.com
Dear Maintainer,
An attacker with an HTTP/2 connection to an affected endpoint can send
a steady stream of invalid frames to force the generation of reset frames
on the victim endpoint. By closing their recv window, the attacker could
then force these resets to be queued in an unbounded fashion, resulting
in Out Of Memory (OOM) and high CPU usage.
This fix is corrected in hyperium/h2#737, which limits the total number
of internal error resets emitted by default before the connection is
closed.
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.6.11-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
More information about the Pkg-rust-maintainers
mailing list