{"id":"RUSTSEC-2024-0003","summary":"Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)","details":"An attacker with an HTTP/2 connection to an affected endpoint can send a steady stream of invalid frames to force the\ngeneration of reset frames on the victim endpoint.\nBy closing their recv window, the attacker could then force these resets to be queued in an unbounded fashion,\nresulting in Out Of Memory (OOM) and high CPU usage.\n\nThis fix is corrected in [hyperium/h2#737](https://github.com/hyperium/h2/pull/737), which limits the total number of\ninternal error resets emitted by default before the connection is closed.","aliases":["GHSA-8r5v-vm4m-4g25"],"modified":"2026-02-04T03:15:37.377206Z","published":"2024-01-17T12:00:00Z","related":["CVE-2019-9514"],"database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/h2"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2024-0003.html"},{"type":"ADVISORY","url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md"}],"affected":[{"package":{"name":"h2","ecosystem":"crates.io","purl":"pkg:cargo/h2"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.3.24"},{"introduced":"0.4.0-0"},{"fixed":"0.4.2"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"functions":[],"arch":[],"os":[]}},"database_specific":{"cvss":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2024-0003.json","categories":["denial-of-service"],"informational":null}}],"schema_version":"1.7.3"}