We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory.
The issue has been addressed in Suricata 7.0.5 and 6.0.19.
Disable the HTTP/2 parser.
Reduce app-layer.protocols.http2.max-table-size value (default is 65536)
app-layer.protocols.http2.max-table-size
https://redmine.openinfosecfoundation.org/issues/6892 https://redmine.openinfosecfoundation.org/issues/6900
OSS-fuzz using quadfuzz
Impact
Small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory.
Patches
The issue has been addressed in Suricata 7.0.5 and 6.0.19.
Workarounds
Disable the HTTP/2 parser.
Reduce
app-layer.protocols.http2.max-table-size
value (default is 65536)References
https://redmine.openinfosecfoundation.org/issues/6892
https://redmine.openinfosecfoundation.org/issues/6900
Credits
OSS-fuzz using quadfuzz