Loading HuntDB...

GHSA-393w-9x6h-8gc7

GitHub Security Advisory

Pingora update for MadeYouReset HTTP/2 vulnerability

✓ GitHub Reviewed HIGH

Advisory Details

Pingora deployments that include HTTP/2 server support may be affected by the vulnerability described in CVE-2025-8671. Under certain conditions, Pingora applications may allocate buffers before the HTTP/2 reset and resulting stream cancellation is processed by the server. Repeated resets can force excessive memory consumption and lead to denial-of-service.

**Impact**:
On affected versions, malicious clients could trigger unusually high memory consumption, which may result in service instability or process termination.

**Credits**:
Reported responsibly by security researcher [Gal Bar Nahum](https://github.com/galbarnahum) (@[galbarnahum](https://github.com/galbarnahum))

**Mitigation**:
This issue is addressed by ensuring Pingora uses patched versions of HTTP/2 dependencies that include reset-handling safeguards to release connection resources before excessive memory buildup. Users should upgrade to the latest Pingora release, which incorporates the required fixes.
- Users are requested to upgrade to latest version of Pingora >= 0.6.0

Affected Packages

crates.io pingora-core
Affected versions: 0 (fixed in 0.6.0)

Key Information

GHSA ID
GHSA-393w-9x6h-8gc7
Published
September 17, 2025 8:46 PM
Last Modified
September 17, 2025 8:46 PM
CVSS Score
7.5 /10
Primary Ecosystem
crates.io
Primary Package
pingora-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 18, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.