Lucene search

K
freebsdFreeBSDC092BE0E-F7CC-11EE-AA6B-B42E991FC52E
HistoryApr 04, 2024 - 12:00 a.m.

forgejo -- HTTP/2 CONTINUATION flood in net/http

2024-04-0400:00:00
vuxml.freebsd.org
6
http/2
continuation frames
security vulnerability
golang
arbitrary header data
hpack state
maxheaderbytes limit
memory allocation
rejected request
huffman-encoded data
excessive frame processing
connection closing
unix

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

12.9%

[email protected] reports:

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts
of header data by sending an excessive number of CONTINUATION frames.
Maintaining HPACK state requires parsing and processing all HEADERS
and CONTINUATION frames on a connection. When a request’s
headers exceed MaxHeaderBytes, no memory is allocated to store the
excess headers, but they are still parsed. This permits an attacker
to cause an HTTP/2 endpoint to read arbitrary amounts of header
data, all associated with a request which is going to be rejected.
These headers can include Huffman-encoded data which is significantly
more expensive for the receiver to decode than for an attacker to
send. The fix sets a limit on the amount of excess header frames
we will process before closing a connection.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchforgejo< 1.21.8UNKNOWN