Description
When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.
Published: 2026-05-07
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The transport layer of the Go standard library rewrites CONTINUATION frames indefinitely when it receives a SETTINGS_MAX_FRAME_SIZE value of zero. This causes the server to spin in an infinite write loop, exhausting CPU and memory resources and making the application unresponsive. Consequently, a remote attacker can force a denial of service by sending a single malformed HTTP/2 SETTINGS frame.

Affected Systems

Vulnerable components include the Go standard library’s net/http package and the golang.org/x/net/http2 module. No specific version identifiers are listed, so any installation using these packages is potentially affected until a fix is applied.

Risk and Exploitability

Because the defect is triggered by a malformed HTTP/2 SETTINGS frame, an attacker only needs to send the frame over a network connection to the vulnerable server. No authentication or elevated privileges are required. Although the EPSS score is not available, the absence of a known exploit in publicly available exploit databases and the fact that the vulnerability is listed as not in the CISA KEV catalog reduce the immediate outbreak risk, yet the potential for a denial of service remains high. The CVSS score is not provided in the public data, but the nature of the infinite loop implies a high impact severity, especially in high‑traffic environments where a single request can stall the entire service. Given that the vulnerability is triggered by an external request, the attack vector is remote based, and the exploitation complexity is low. The impact on data confidentiality is negligible, but the availability of the affected service is severely compromised.

Generated by OpenCVE AI on May 7, 2026 at 21:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Go to the latest stable release that contains the patch for this infinite loop issue
  • Upgrade the golang.org/x/net module to its most recent version that includes the correction
  • If an immediate upgrade is not possible, disable HTTP/2 on the affected servers or configure the HTTP/2 implementation to reject SETTINGS frames with a MAX_FRAME_SIZE of 0
  • Monitor network traffic for unusual HTTP/2 SETTINGS framing and block any connection that transmits a zero value for SETTINGS_MAX_FRAME_SIZE

Generated by OpenCVE AI on May 7, 2026 at 21:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-648
CWE-999

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/http
Golang
Golang http2
Vendors & Products Go Standard Library
Go Standard Library net/http
Golang
Golang http2

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.
Title Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net
References

Subscriptions

Go Standard Library Net/http
Golang Http2
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-07T19:41:17.631Z

Reserved: 2026-03-23T20:35:32.814Z

Link: CVE-2026-33814

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T20:16:42.880

Modified: 2026-05-07T20:38:04.860

Link: CVE-2026-33814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T22:00:12Z

Weaknesses