Vulnerability DatabaseGHSA-8r5v-vm4m-4g25

GHSA-8r5v-vm4m-4g25
Rust vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-8r5v-vm4m-4g25) affects the h2 Rust crate, which is an HTTP/2 implementation. Discovered and disclosed on January 17, 2024, this resource exhaustion vulnerability can lead to Denial of Service (DoS) attacks. The affected versions are < 0.3.24 and >= 0.4.0, < 0.4.2, with patches available in versions 0.3.24 and 0.4.2 (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability allows an attacker with an HTTP/2 connection to send a steady stream of invalid frames, forcing the generation of reset frames on the victim endpoint. By closing their receive window, the attacker can force these resets to be queued in an unbounded fashion. This unbounded queuing leads to Out Of Memory (OOM) conditions and high CPU usage on the target system (RustSec Advisory).

Impact

When successfully exploited, this vulnerability can cause significant resource exhaustion on affected systems, leading to Out Of Memory (OOM) conditions and high CPU usage. This can effectively result in a Denial of Service (DoS), potentially making the service unavailable to legitimate users (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in h2 versions 0.3.24 and 0.4.2. The fix implements a limit on the total number of internal error resets emitted before the connection is closed, preventing the unbounded queuing of reset frames. Users should upgrade to these patched versions: ^0.3.24 OR >=0.4.2. The fix was implemented in PR #737, which adds a configurable threshold (defaulting to 1024) after which connections generating excessive resets are terminated (GitHub PR).

Community reactions

The vulnerability has gained attention in the Rust ecosystem, with multiple projects and organizations quickly responding to patch their dependencies. Several high-profile projects including MystenLabs/sui, dragonflyoss/nydus, and others have issued updates to address this vulnerability, demonstrating the security-conscious nature of the Rust community (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22863CRITICAL9.2
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-23519HIGH8.9
  • RustRust
  • yazi
NoYesJan 15, 2026
RUSTSEC-2026-0003HIGH8.9
  • RustRust
  • cmov
NoYesJan 14, 2026
CVE-2026-22864HIGH8.1
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-22782LOW2.9
  • RustRust
  • rustfs
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management