Scan Vulnerability Database with the following command

$ go install golang.org/x/vuln/cmd/govulncheck@latest
$ govulncheck ./...
Vulnerability #1: GO-2022-0969
  HTTP/2 server connections can hang forever waiting for a clean
  shutdown that was preempted by a fatal error. This condition can
  be exploited by a malicious client to cause a denial of service.

  Call stacks in your code:
      gin.go:561:18: github.com/gin-gonic/gin.Engine.RunListener calls net/http.Serve, which eventually calls golang.org/x/net/http2.Server.ServeConn

  Found in: golang.org/x/net/http2@v0.0.0-20211112202133-69e39bad7dc2
  Fixed in: golang.org/x/net/http2@v0.0.0-20220906165146-f3363e06e74c
  More info: https://pkg.go.dev/vuln/GO-2022-0969

Vulnerability #2: GO-2022-0288
  An attacker can cause unbounded memory growth in servers
  accepting HTTP/2 requests.

  Call stacks in your code:
      gin.go:561:18: github.com/gin-gonic/gin.Engine.RunListener calls net/http.Serve, which eventually calls golang.org/x/net/http2.Server.ServeConn

  Found in: golang.org/x/net/http2@v0.0.0-20211112202133-69e39bad7dc2
  Fixed in: golang.org/x/net/http2@v0.0.0-20211209124913-491a49abca63
  More info: https://pkg.go.dev/vuln/GO-2022-0288

Comment From: jerome-laforge

As workaround in order to mitigate this CVE:

go get golang.org/x/net@latest
go: upgraded golang.org/x/net v0.0.0-20220624214902-1bab6f366d9e => v0.0.0-20220921203646-d300de134e69
go: upgraded golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a => v0.0.0-20220728004956-3c1f35247d10