"details":"Some HTTP/2 implementations are vulnerable to a reset flood, potentially\nleading to a denial of service.\n\nServers that accept direct connections from untrusted clients could be\nremotely made to allocate an unlimited amount of memory, until the program\ncrashes. The attacker opens a number of streams and sends an invalid request\nover each stream that should solicit a stream of RST_STREAM frames from the\npeer. Depending on how the peer queues the RST_STREAM frames, this can\nconsume excess memory, CPU, or both.\n",