DirectorySecurity Advisories
Sign In
Security Advisories

CGA-pwww-2g56-2xx7

Published

Last updated

https://images.chainguard.dev/security/CGA-pwww-2g56-2xx7
Package

zed

Latest Update
Fixed
Fixed Version

0.146.3-r0

Aliases
  • GHSA-q6cp-qfwq-4gcv

Severity

5.3

Medium

CVSS V3

Summary

h2 servers vulnerable to degradation of service with CONTINUATION Flood

Description

An attacker can send a flood of CONTINUATION frames, causing h2 to process them indefinitely. This results in an increase in CPU usage.

Tokio task budget helps prevent this from a complete denial-of-service, as the server can still respond to legitimate requests, albeit with increased latency.

More details at https://seanmonstar.com/blog/hyper-http2-continuation-flood/.

Patches available for 0.4.x and 0.3.x versions.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images