Reset flood in net/http and golang.org/x/net/http

Overview

Source
ID
GO-2022-0536
Aliases
CVE-2019-9512
CVE-2019-9514
GHSA-39qc-96h7-956f
GHSA-hgr8-6h9x-f7q9
Affected package

Description

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service.

Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

Summary

23.51k
Total packages affected
Packages with at least one version that is affected by the advisory or has an affected dependency.
4.46k
Packages with a known fix
Packages with versions affected by the advisory that have a greater version that is not affected.
1.75%
Total ecosystem affected
The proportion of packages in the ecosystem that are affected by the advisory (fixed or not).
Affected Version: Introduced: 0, Fixed: 0.0.0-20190813141303-74dc4d7220e7
Patched/Unaffected
v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0
v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.14.0
v0.15.0
v0.16.0
v0.17.0
v0.18.0
v0.19.0
v0.20.0
v0.21.0
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.27.0
v0.28.0
v0.29.0
v0.30.0
v0.31.0
v0.32.0
v0.33.0
v0.34.0
v0.35.0
v0.36.0
v0.37.0
Affected