mirror of
https://github.com/rustsec/advisory-db.git
synced 2025-12-27 01:54:07 -05:00
Assigned RUSTSEC-2023-0034 to h2 (#1687)
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
7ca4586eb8
commit
cab69cc909
@@ -1,3 +1,3 @@
|
||||
This file causes merge conflicts if two ID assignment jobs run concurrently.
|
||||
This prevents duplicate ID assignment due to a race between those jobs.
|
||||
5939f363a07849c25ca69e87e2a4961fd6d91882fe86fbdb14c315bfc03b7a24 -
|
||||
b39c2f9154efdb9539b9db4296b1d8114dd98705de56d45a8472de7e678c8e20 -
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
id = "RUSTSEC-2023-0034"
|
||||
package = "h2"
|
||||
date = "2023-04-14"
|
||||
url = "https://github.com/hyperium/hyper/issues/2877"
|
||||
@@ -15,4 +15,4 @@ patched = [">= 0.3.17"]
|
||||
|
||||
If an attacker is able to flood the network with pairs of `HEADERS`/`RST_STREAM` frames, such that the `h2` application is not able to accept them faster than the bytes are received, the pending accept queue can grow in memory usage. Being able to do this consistently can result in excessive memory use, and eventually trigger Out Of Memory.
|
||||
|
||||
This flaw is corrected in [hyperium/h2#668](https://github.com/hyperium/h2/pull/668), which restricts remote reset stream count by default.
|
||||
This flaw is corrected in [hyperium/h2#668](https://github.com/hyperium/h2/pull/668), which restricts remote reset stream count by default.
|
||||
Reference in New Issue
Block a user