/
DirectorySecurity AdvisoriesPricing
Sign in
Security Advisories

GHSA-q6cp-qfwq-4gcv

Published

Last updated

https://github.com/advisories/GHSA-q6cp-qfwq-4gcv

Severity

5.3

Medium

CVSS CVSS_V3

Summary

h2 servers vulnerable to degradation of service with CONTINUATION Flood

Description

An attacker can send a flood of CONTINUATION frames, causing h2 to process them indefinitely. This results in an increase in CPU usage.

Tokio task budget helps prevent this from a complete denial-of-service, as the server can still respond to legitimate requests, albeit with increased latency.

More details at https://seanmonstar.com/blog/hyper-http2-continuation-flood/.

Patches available for 0.4.x and 0.3.x versions.

References

  • https://github.com/advisories/GHSA-q6cp-qfwq-4gcv

Affected packages


Safe Source for Open Sourceâ„¢
Contact us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing