Skip to content

h2 servers vulnerable to degradation of service with CONTINUATION Flood

Moderate severity GitHub Reviewed Published Apr 5, 2024 to the GitHub Advisory Database • Updated Apr 5, 2024

Package

cargo h2 (Rust)

Affected versions

< 0.3.26
>= 0.4.0, < 0.4.4

Patched versions

0.3.26
0.4.4

Description

An attacker can send a flood of CONTINUATION frames, causing h2 to process them indefinitely. This results in an increase in CPU usage.

Tokio task budget helps prevent this from a complete denial-of-service, as the server can still respond to legitimate requests, albeit with increased latency.

More details at https://seanmonstar.com/blog/hyper-http2-continuation-flood/.

Patches available for 0.4.x and 0.3.x versions.

References

Published to the GitHub Advisory Database Apr 5, 2024
Reviewed Apr 5, 2024
Last updated Apr 5, 2024

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE ID

No known CVE

GHSA ID

GHSA-q6cp-qfwq-4gcv

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.