HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-04
https://nowotarski.info/http2-continuation-flood/
https://kb.cert.org/vuls/id/421644
https://www.openwall.com/lists/oss-security/2024/04/03/16
https://support.apple.com/kb/HT214119
http://www.openwall.com/lists/oss-security/2024/04/04/4
http://seclists.org/fulldisclosure/2024/Jul/18
Source: Mitre, NVD
Published: 2024-04-04
Updated: 2024-08-01
Named Vulnerability: HTTP/2 CONTINUATION Flood
Base Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Severity: High
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.90448