Bug 2373309 (CVE-2025-48989)

Summary: CVE-2025-48989 tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: csutherl, dsoumis, jclere, pjindal, plodge, rmaucher, security-response-team, szappis
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Apache Tomcat where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2388467, 2388468    
Bug Blocks:    
Deadline: 2025-08-16   

Description OSIDB Bzimport 2025-06-18 08:40:26 UTC
HTTP/2 (including DNS over HTTPS) contains a design flaw and is vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames Vulnerabilities.

Comment 2 errata-xmlrpc 2025-08-13 15:04:30 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 6.1.2

Via RHSA-2025:13686 https://access.redhat.com/errata/RHSA-2025:13686

Comment 3 errata-xmlrpc 2025-08-13 15:05:07 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 6.1 on RHEL 10
  Red Hat JBoss Web Server 6.1 on RHEL 8
  Red Hat JBoss Web Server 6.1 on RHEL 9

Via RHSA-2025:13685 https://access.redhat.com/errata/RHSA-2025:13685

Comment 4 errata-xmlrpc 2025-08-20 15:31:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:14178 https://access.redhat.com/errata/RHSA-2025:14178

Comment 5 errata-xmlrpc 2025-08-20 15:31:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:14179 https://access.redhat.com/errata/RHSA-2025:14179

Comment 6 errata-xmlrpc 2025-08-20 15:34:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:14182 https://access.redhat.com/errata/RHSA-2025:14182

Comment 7 errata-xmlrpc 2025-08-20 15:35:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:14177 https://access.redhat.com/errata/RHSA-2025:14177

Comment 8 errata-xmlrpc 2025-08-20 15:37:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:14181 https://access.redhat.com/errata/RHSA-2025:14181

Comment 9 errata-xmlrpc 2025-08-20 15:38:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:14183 https://access.redhat.com/errata/RHSA-2025:14183

Comment 10 errata-xmlrpc 2025-08-20 15:41:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:14180 https://access.redhat.com/errata/RHSA-2025:14180