![]() |
|
Message-ID: <CALDM2HcdZBx2fBazx0oe2Om9VokTrYUMjb77DN80Ov40Ru1mcQ@mail.gmail.com>
Date: Wed, 20 Aug 2025 15:38:18 -0600
From: Nick Tait <ntait@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: HTTP/2 implementations are vulnerable to
"MadeYouReset" DoS attack through HTTP/2 control frames
One more was published today:
- Jetty - CVE-2025-5115
https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h
----------
Jetty's Team Notes
> Impact
> A denial of service vulnerability similar to Rapid Reset, but where the
> client triggers a reset from the server by sending a malformed or invalid
> frame.
> In particular, this may be triggered by WINDOW_UPDATE frames that are
> invalid (e.g. with delta==0 or when the delta makes the window exceed
> 2^31-1).
>
> Patches
> Patch has been merged into 12.0.x mainline via #13449.
>
> Workarounds
> No workarounds apart disabling HTTP/2.
On Sat, Aug 16, 2025 at 11:30 AM Alan Coopersmith <
alan.coopersmith@...cle.com> wrote:
> On 8/13/25 11:27, Alan Coopersmith wrote:
> > https://kb.cert.org/vuls/id/767506 was published today:
> >
> >> HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack
> >> through HTTP/2 control frames
> >> Vulnerability Note VU#767506
> >> Original Release Date: 2025-08-13 | Last Revised: 2025-08-13
> >>
> >> Overview
> >> --------
> >> A vulnerability has been discovered within many HTTP/2 implementations
> >> allowing for denial of service (DoS) attacks through HTTP/2 control
> frames.
> >> This vulnerability is colloquially known as "MadeYouReset" and is
> tracked
> >> as CVE-2025-8671. Some vendors have assigned a specific CVE to their
> >> products to describe the vulnerability, such as CVE-2025-48989, which is
> >> used to identify Apache Tomcat products affected by the vulnerability.
>
> OSS implementations that have responded (whether affected or not) include:
>
> - Apache Tomcat - CVE-2025-48989
> https://www.openwall.com/lists/oss-security/2025/08/13/2
>
> - h2o - CVE-2025-8671
> https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq
>
> - hyper.rs h2 - CVE-2025-8671
> https://seanmonstar.com/blog/hyper-http2-didnt-madeyoureset/
>
> - ISC BIND - CVE-2025-8671
> https://gitlab.isc.org/isc-projects/bind9/-/issues/5325
>
> - lighttpd - CVE-2025-8671
> https://www.lighttpd.net/2025/8/13/1.4.80/
>
> - Netty - CVE-2025-55163
> https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4
>
> - Varnish - CVE-2025-8671
> https://varnish-cache.org/security/VSV00017.html
>
> --
> -Alan Coopersmith- alan.coopersmith@...cle.com
> Oracle Solaris Engineering - https://blogs.oracle.com/solaris
>
>
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.