Some HTTP/2 implementations is vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
CPE | Name | Operator | Version |
---|---|---|---|
go/golang.org/x/net | lt | 0.0.0-20190813141303-74dc4d7220e7 |