Bug 2388252 (CVE-2025-55163)
Summary: | CVE-2025-55163 netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aazores, abrianik, anstephe, aprice, aschwart, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, caswilli, ccranfor, cdewolf, chfoley, clement.escoffier, cmah, dandread, darran.lofthouse, dbruscin, dhanak, dkreling, dnakabaa, dosoudil, drosa, dsimansk, eaguilar, ebaron, eric.wittmann, fjuma, fmariani, fmongiar, ggrzybek, gmalinko, gsmet, gtanzill, ibek, istudens, ivassile, iweiss, janstey, jbuscemi, jcantril, jkoehler, jmartisk, jnethert, joehler, jolong, jpechane, jpoth, jrokos, jsamir, jscholz, kaycoth, kgaikwad, kholdawa, kingland, kvanderr, kverlaen, lcouzens, lgao, lphiri, lthon, manderse, matzew, mnovotny, mosmerov, mposolda, mskarbek, msochure, msvehla, nipatil, nwallace, oezr, olubyans, pantinor, parichar, pbizzarr, pdelbell, pesilva, pgallagh, pjindal, pmackay, probinso, rguimara, rkubis, rojacob, rruss, rstancel, rstepani, rsvoboda, sausingh, sbiarozk, sdawley, smaestri, ssilvert, sthirugn, sthorger, swoodman, tasato, tcunning, tom.jenkinson, tqvarnst, vkrizan, vmuzikar, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2388301 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-08-13 15:02:21 UTC
This issue has been addressed in the following products: Red Hat Build of Apache Camel 4.10 for Quarkus 3.20 Via RHSA-2025:14197 https://access.redhat.com/errata/RHSA-2025:14197 This issue has been addressed in the following products: Red Hat build of Apache Camel 4.10.6 for Spring Boot 3.4.9 Via RHSA-2025:14911 https://access.redhat.com/errata/RHSA-2025:14911 This issue has been addressed in the following products: Cryostat 4 on RHEL 9 Via RHSA-2025:14919 https://access.redhat.com/errata/RHSA-2025:14919 This issue has been addressed in the following products: Streams for Apache Kafka 2.9.2 Via RHSA-2025:15697 https://access.redhat.com/errata/RHSA-2025:15697 This issue has been addressed in the following products: Streams for Apache Kafka 3.0.1 Via RHSA-2025:16407 https://access.redhat.com/errata/RHSA-2025:16407 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.1.0 Via RHSA-2025:17299 https://access.redhat.com/errata/RHSA-2025:17299 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 9 Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 Via RHSA-2025:17298 https://access.redhat.com/errata/RHSA-2025:17298 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0.9 Via RHSA-2025:17318 https://access.redhat.com/errata/RHSA-2025:17318 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 Via RHSA-2025:17317 https://access.redhat.com/errata/RHSA-2025:17317 |