golang.org/x/net/http vulnerable to ping floods
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated May 20, 2024
Package
Affected versions
< 0.0.0-20190813141303-74dc4d7220e7
Patched versions
0.0.0-20190813141303-74dc4d7220e7
Description
Published by the National Vulnerability Database
Aug 13, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Feb 8, 2023
Last updated
May 20, 2024
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Specific Go Packages Affected
golang.org/x/net/http2
References