Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| golang.org/x/net(Go) | 0 | 0.0.0-20190813141303-74dc4d7220e7 | N/A |
CVSS Metrics