Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2dd5cf69-44a8-44f0-8fd9-8a3e654a8d45@oracle.com>
Date: Sat, 16 Aug 2025 10:29:50 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: HTTP/2 implementations are vulnerable to
 "MadeYouReset" DoS attack through HTTP/2 control frames

On 8/13/25 11:27, Alan Coopersmith wrote:
> https://kb.cert.org/vuls/id/767506 was published today:
> 
>> HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack
>>  through HTTP/2 control frames
>> Vulnerability Note VU#767506
>> Original Release Date: 2025-08-13 | Last Revised: 2025-08-13
>>
>> Overview
>> --------
>> A vulnerability has been discovered within many HTTP/2 implementations
>> allowing for denial of service (DoS) attacks through HTTP/2 control frames.
>> This vulnerability is colloquially known as "MadeYouReset" and is tracked
>> as CVE-2025-8671. Some vendors have assigned a specific CVE to their
>> products to describe the vulnerability, such as CVE-2025-48989, which is
>> used to identify Apache Tomcat products affected by the vulnerability.

OSS implementations that have responded (whether affected or not) include:

- Apache Tomcat - CVE-2025-48989
   https://www.openwall.com/lists/oss-security/2025/08/13/2

- h2o - CVE-2025-8671
   https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq

- hyper.rs h2 - CVE-2025-8671
   https://seanmonstar.com/blog/hyper-http2-didnt-madeyoureset/

- ISC BIND - CVE-2025-8671
   https://gitlab.isc.org/isc-projects/bind9/-/issues/5325

- lighttpd - CVE-2025-8671
   https://www.lighttpd.net/2025/8/13/1.4.80/

- Netty - CVE-2025-55163
   https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4

- Varnish - CVE-2025-8671
   https://varnish-cache.org/security/VSV00017.html

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.