High severity7.5CISA KEVNVD Advisory· Published Oct 10, 2023· Updated May 12, 2026
CVE-2023-44487
CVE-2023-44487
Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Affected products
1- HTTP/2/HTTP/2description
Patches
32 files changed · +6 −1
ChangeLog.md+5 −0 modified@@ -1,3 +1,8 @@ +## 4.2.1 + +* Adding rate limit for RST_STREAM to work around CVE-2023-44487. + [#94](https://github.com/kazu-yamamoto/http2/pull/94) + ## 4.2.0 * Treating HALF_CLOSED_LOCAL correctly.
http2.cabal+1 −1 modified@@ -1,6 +1,6 @@ cabal-version: >=1.10 name: http2 -version: 4.2.0 +version: 4.2.1 license: BSD3 license-file: LICENSE maintainer: Kazu Yamamoto <kazu@iij.ad.jp>
58f75f665aa8Merge pull request from GHSA-xpw8-rcwv-8f8p
9 files changed · +316 −41
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java+22 −2 modified@@ -109,6 +109,8 @@ public abstract class AbstractHttp2ConnectionHandlerBuilder<T extends Http2Conne private boolean autoAckPingFrame = true; private int maxQueuedControlFrames = Http2CodecUtil.DEFAULT_MAX_QUEUED_CONTROL_FRAMES; private int maxConsecutiveEmptyFrames = 2; + private int maxRstFramesPerWindow = 200; + private int secondsPerWindow = 30; /** * Sets the {@link Http2Settings} to use for the initial connection settings exchange. @@ -410,7 +412,7 @@ protected Http2PromisedRequestVerifier promisedRequestVerifier() { /** * Returns the maximum number of consecutive empty DATA frames (without end_of_stream flag) that are allowed before - * the connection is closed. This allows to protected against the remote peer flooding us with such frames and + * the connection is closed. This allows to protect against the remote peer flooding us with such frames and * so use up a lot of CPU. There is no valid use-case for empty DATA frames without end_of_stream flag. * * {@code 0} means no protection is in place. @@ -421,7 +423,7 @@ protected int decoderEnforceMaxConsecutiveEmptyDataFrames() { /** * Sets the maximum number of consecutive empty DATA frames (without end_of_stream flag) that are allowed before - * the connection is closed. This allows to protected against the remote peer flooding us with such frames and + * the connection is closed. This allows to protect against the remote peer flooding us with such frames and * so use up a lot of CPU. There is no valid use-case for empty DATA frames without end_of_stream flag. * * {@code 0} means no protection should be applied. @@ -433,6 +435,21 @@ protected B decoderEnforceMaxConsecutiveEmptyDataFrames(int maxConsecutiveEmptyF return self(); } + /** + * Sets the maximum number RST frames that are allowed per window before + * the connection is closed. This allows to protect against the remote peer flooding us with such frames and + * so use up a lot of CPU. + * + * {@code 0} for any of the parameters means no protection should be applied. + */ + protected B decoderEnforceMaxRstFramesPerWindow(int maxRstFramesPerWindow, int secondsPerWindow) { + enforceNonCodecConstraints("decoderEnforceMaxRstFramesPerWindow"); + this.maxRstFramesPerWindow = checkPositiveOrZero( + maxRstFramesPerWindow, "maxRstFramesPerWindow"); + this.secondsPerWindow = checkPositiveOrZero(secondsPerWindow, "secondsPerWindow"); + return self(); + } + /** * Determine if settings frame should automatically be acknowledged and applied. * @return this. @@ -575,6 +592,9 @@ private T buildFromCodec(Http2ConnectionDecoder decoder, Http2ConnectionEncoder if (maxConsecutiveEmptyDataFrames > 0) { decoder = new Http2EmptyDataFrameConnectionDecoder(decoder, maxConsecutiveEmptyDataFrames); } + if (maxRstFramesPerWindow > 0 && secondsPerWindow > 0) { + decoder = new Http2MaxRstFrameDecoder(decoder, maxRstFramesPerWindow, secondsPerWindow); + } final T handler; try { // Call the abstract build method
codec-http2/src/main/java/io/netty/handler/codec/http2/Http2FrameCodecBuilder.java+6 −0 modified@@ -194,6 +194,12 @@ public Http2FrameCodecBuilder decoderEnforceMaxConsecutiveEmptyDataFrames(int ma return super.decoderEnforceMaxConsecutiveEmptyDataFrames(maxConsecutiveEmptyFrames); } + @Override + public Http2FrameCodecBuilder decoderEnforceMaxRstFramesPerWindow( + int maxConsecutiveEmptyFrames, int secondsPerWindow) { + return super.decoderEnforceMaxRstFramesPerWindow(maxConsecutiveEmptyFrames, secondsPerWindow); + } + /** * Build a {@link Http2FrameCodec} object. */
codec-http2/src/main/java/io/netty/handler/codec/http2/Http2MaxRstFrameDecoder.java+58 −0 added@@ -0,0 +1,58 @@ +/* + * Copyright 2023 The Netty Project + * + * The Netty Project licenses this file to you under the Apache License, + * version 2.0 (the "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at: + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the + * License for the specific language governing permissions and limitations + * under the License. + */ +package io.netty.handler.codec.http2; + +import static io.netty.util.internal.ObjectUtil.checkPositive; + + +/** + * Enforce a limit on the maximum number of RST frames that are allowed per a window + * before the connection will be closed with a GO_AWAY frame. + */ +final class Http2MaxRstFrameDecoder extends DecoratingHttp2ConnectionDecoder { + private final int maxRstFramesPerWindow; + private final int secondsPerWindow; + + Http2MaxRstFrameDecoder(Http2ConnectionDecoder delegate, int maxRstFramesPerWindow, int secondsPerWindow) { + super(delegate); + this.maxRstFramesPerWindow = checkPositive(maxRstFramesPerWindow, "maxRstFramesPerWindow"); + this.secondsPerWindow = checkPositive(secondsPerWindow, "secondsPerWindow"); + } + + @Override + public void frameListener(Http2FrameListener listener) { + if (listener != null) { + super.frameListener(new Http2MaxRstFrameListener(listener, maxRstFramesPerWindow, secondsPerWindow)); + } else { + super.frameListener(null); + } + } + + @Override + public Http2FrameListener frameListener() { + Http2FrameListener frameListener = frameListener0(); + // Unwrap the original Http2FrameListener as we add this decoder under the hood. + if (frameListener instanceof Http2MaxRstFrameListener) { + return ((Http2MaxRstFrameListener) frameListener).listener; + } + return frameListener; + } + + // Package-private for testing + Http2FrameListener frameListener0() { + return super.frameListener(); + } +}
codec-http2/src/main/java/io/netty/handler/codec/http2/Http2MaxRstFrameListener.java+58 −0 added@@ -0,0 +1,58 @@ +/* + * Copyright 2023 The Netty Project + * + * The Netty Project licenses this file to you under the Apache License, + * version 2.0 (the "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at: + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the + * License for the specific language governing permissions and limitations + * under the License. + */ +package io.netty.handler.codec.http2; + +import io.netty.channel.ChannelHandlerContext; +import io.netty.util.internal.logging.InternalLogger; +import io.netty.util.internal.logging.InternalLoggerFactory; + +import java.util.concurrent.TimeUnit; + + +final class Http2MaxRstFrameListener extends Http2FrameListenerDecorator { + private static final InternalLogger logger = InternalLoggerFactory.getInstance(Http2MaxRstFrameListener.class); + + private final long nanosPerWindow; + private final int maxRstFramesPerWindow; + private long lastRstFrameNano = System.nanoTime(); + private int receivedRstInWindow; + + Http2MaxRstFrameListener(Http2FrameListener listener, int maxRstFramesPerWindow, int secondsPerWindow) { + super(listener); + this.maxRstFramesPerWindow = maxRstFramesPerWindow; + this.nanosPerWindow = TimeUnit.SECONDS.toNanos(secondsPerWindow); + } + + @Override + public void onRstStreamRead(ChannelHandlerContext ctx, int streamId, long errorCode) throws Http2Exception { + long currentNano = System.nanoTime(); + if (currentNano - lastRstFrameNano >= nanosPerWindow) { + lastRstFrameNano = currentNano; + receivedRstInWindow = 1; + } else { + receivedRstInWindow++; + if (receivedRstInWindow > maxRstFramesPerWindow) { + Http2Exception exception = Http2Exception.connectionError(Http2Error.ENHANCE_YOUR_CALM, + "Maximum number of RST frames reached"); + logger.debug("{} Maximum number {} of RST frames reached within {} seconds, " + + "closing connection with {} error", ctx.channel(), maxRstFramesPerWindow, + TimeUnit.NANOSECONDS.toSeconds(nanosPerWindow), exception.error(), exception); + throw exception; + } + } + super.onRstStreamRead(ctx, streamId, errorCode); + } +}
codec-http2/src/main/java/io/netty/handler/codec/http2/Http2MultiplexCodecBuilder.java+6 −0 modified@@ -211,6 +211,12 @@ public Http2MultiplexCodecBuilder decoderEnforceMaxConsecutiveEmptyDataFrames(in return super.decoderEnforceMaxConsecutiveEmptyDataFrames(maxConsecutiveEmptyFrames); } + @Override + public Http2MultiplexCodecBuilder decoderEnforceMaxRstFramesPerWindow( + int maxConsecutiveEmptyFrames, int secondsPerWindow) { + return super.decoderEnforceMaxRstFramesPerWindow(maxConsecutiveEmptyFrames, secondsPerWindow); + } + @Override public Http2MultiplexCodec build() { Http2FrameWriter frameWriter = this.frameWriter;
codec-http2/src/test/java/io/netty/handler/codec/http2/AbstractDecoratingHttp2ConnectionDecoderTest.java+63 −0 added@@ -0,0 +1,63 @@ +/* + * Copyright 2023 The Netty Project + * + * The Netty Project licenses this file to you under the Apache License, version 2.0 (the + * "License"); you may not use this file except in compliance with the License. You may obtain a + * copy of the License at: + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software distributed under the License + * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express + * or implied. See the License for the specific language governing permissions and limitations under + * the License. + */ +package io.netty.handler.codec.http2; + +import org.hamcrest.CoreMatchers; +import org.junit.jupiter.api.Test; +import org.mockito.ArgumentCaptor; +import org.mockito.invocation.InvocationOnMock; +import org.mockito.stubbing.Answer; + +import static org.junit.jupiter.api.Assertions.assertNull; +import static org.hamcrest.MatcherAssert.assertThat; +import static org.mockito.Mockito.mock; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.when; + +public abstract class AbstractDecoratingHttp2ConnectionDecoderTest { + + protected abstract DecoratingHttp2ConnectionDecoder newDecoder(Http2ConnectionDecoder decoder); + + protected abstract Class<? extends Http2FrameListener> delegatingFrameListenerType(); + + @Test + public void testDecoration() { + Http2ConnectionDecoder delegate = mock(Http2ConnectionDecoder.class); + final ArgumentCaptor<Http2FrameListener> listenerArgumentCaptor = + ArgumentCaptor.forClass(Http2FrameListener.class); + when(delegate.frameListener()).then(new Answer<Http2FrameListener>() { + @Override + public Http2FrameListener answer(InvocationOnMock invocationOnMock) { + return listenerArgumentCaptor.getValue(); + } + }); + Http2FrameListener listener = mock(Http2FrameListener.class); + DecoratingHttp2ConnectionDecoder decoder = newDecoder(delegate); + decoder.frameListener(listener); + verify(delegate).frameListener(listenerArgumentCaptor.capture()); + + assertThat(decoder.frameListener(), + CoreMatchers.not(CoreMatchers.instanceOf(delegatingFrameListenerType()))); + } + + @Test + public void testDecorationWithNull() { + Http2ConnectionDecoder delegate = mock(Http2ConnectionDecoder.class); + + DecoratingHttp2ConnectionDecoder decoder = newDecoder(delegate); + decoder.frameListener(null); + assertNull(decoder.frameListener()); + } +}
codec-http2/src/test/java/io/netty/handler/codec/http2/Http2EmptyDataFrameConnectionDecoderTest.java+7 −39 modified@@ -14,47 +14,15 @@ */ package io.netty.handler.codec.http2; -import org.hamcrest.CoreMatchers; -import org.junit.jupiter.api.Test; -import org.mockito.ArgumentCaptor; -import org.mockito.invocation.InvocationOnMock; -import org.mockito.stubbing.Answer; +public class Http2EmptyDataFrameConnectionDecoderTest extends AbstractDecoratingHttp2ConnectionDecoderTest { -import static org.hamcrest.MatcherAssert.assertThat; -import static org.junit.jupiter.api.Assertions.assertNull; -import static org.mockito.Mockito.mock; -import static org.mockito.Mockito.verify; -import static org.mockito.Mockito.when; - -public class Http2EmptyDataFrameConnectionDecoderTest { - - @Test - public void testDecoration() { - Http2ConnectionDecoder delegate = mock(Http2ConnectionDecoder.class); - final ArgumentCaptor<Http2FrameListener> listenerArgumentCaptor = - ArgumentCaptor.forClass(Http2FrameListener.class); - when(delegate.frameListener()).then(new Answer<Http2FrameListener>() { - @Override - public Http2FrameListener answer(InvocationOnMock invocationOnMock) { - return listenerArgumentCaptor.getValue(); - } - }); - Http2FrameListener listener = mock(Http2FrameListener.class); - Http2EmptyDataFrameConnectionDecoder decoder = new Http2EmptyDataFrameConnectionDecoder(delegate, 2); - decoder.frameListener(listener); - verify(delegate).frameListener(listenerArgumentCaptor.capture()); - - assertThat(decoder.frameListener(), - CoreMatchers.not(CoreMatchers.instanceOf(Http2EmptyDataFrameListener.class))); - assertThat(decoder.frameListener0(), CoreMatchers.instanceOf(Http2EmptyDataFrameListener.class)); + @Override + protected DecoratingHttp2ConnectionDecoder newDecoder(Http2ConnectionDecoder decoder) { + return new Http2EmptyDataFrameConnectionDecoder(decoder, 2); } - @Test - public void testDecorationWithNull() { - Http2ConnectionDecoder delegate = mock(Http2ConnectionDecoder.class); - - Http2EmptyDataFrameConnectionDecoder decoder = new Http2EmptyDataFrameConnectionDecoder(delegate, 2); - decoder.frameListener(null); - assertNull(decoder.frameListener()); + @Override + protected Class<? extends Http2FrameListener> delegatingFrameListenerType() { + return Http2EmptyDataFrameListener.class; } }
codec-http2/src/test/java/io/netty/handler/codec/http2/Http2MaxRstFrameConnectionDecoderTest.java+28 −0 added@@ -0,0 +1,28 @@ +/* + * Copyright 2023 The Netty Project + * + * The Netty Project licenses this file to you under the Apache License, version 2.0 (the + * "License"); you may not use this file except in compliance with the License. You may obtain a + * copy of the License at: + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software distributed under the License + * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express + * or implied. See the License for the specific language governing permissions and limitations under + * the License. + */ +package io.netty.handler.codec.http2; + +public class Http2MaxRstFrameConnectionDecoderTest extends AbstractDecoratingHttp2ConnectionDecoderTest { + + @Override + protected DecoratingHttp2ConnectionDecoder newDecoder(Http2ConnectionDecoder decoder) { + return new Http2MaxRstFrameDecoder(decoder, 200, 30); + } + + @Override + protected Class<? extends Http2FrameListener> delegatingFrameListenerType() { + return Http2MaxRstFrameListener.class; + } +}
codec-http2/src/test/java/io/netty/handler/codec/http2/Http2MaxRstFrameListenerTest.java+68 −0 added@@ -0,0 +1,68 @@ +/* + * Copyright 2023 The Netty Project + * + * The Netty Project licenses this file to you under the Apache License, version 2.0 (the + * "License"); you may not use this file except in compliance with the License. You may obtain a + * copy of the License at: + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software distributed under the License + * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express + * or implied. See the License for the specific language governing permissions and limitations under + * the License. + */ +package io.netty.handler.codec.http2; + +import io.netty.channel.ChannelHandlerContext; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.function.Executable; +import org.mockito.Mock; + +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.junit.jupiter.api.Assertions.assertThrows; +import static org.mockito.ArgumentMatchers.anyInt; +import static org.mockito.Mockito.eq; +import static org.mockito.Mockito.times; +import static org.mockito.Mockito.verify; +import static org.mockito.MockitoAnnotations.initMocks; + +public class Http2MaxRstFrameListenerTest { + + @Mock + private Http2FrameListener frameListener; + @Mock + private ChannelHandlerContext ctx; + + private Http2MaxRstFrameListener listener; + + @BeforeEach + public void setUp() { + initMocks(this); + } + + @Test + public void testMaxRstFramesReached() throws Http2Exception { + listener = new Http2MaxRstFrameListener(frameListener, 1, 10); + listener.onRstStreamRead(ctx, 1, Http2Error.STREAM_CLOSED.code()); + + Http2Exception ex = assertThrows(Http2Exception.class, new Executable() { + @Override + public void execute() throws Throwable { + listener.onRstStreamRead(ctx, 2, Http2Error.STREAM_CLOSED.code()); + } + }); + assertEquals(Http2Error.ENHANCE_YOUR_CALM, ex.error()); + verify(frameListener, times(1)).onRstStreamRead(eq(ctx), anyInt(), eq(Http2Error.STREAM_CLOSED.code())); + } + + @Test + public void testRstFrames() throws Exception { + listener = new Http2MaxRstFrameListener(frameListener, 1, 1); + listener.onRstStreamRead(ctx, 1, Http2Error.STREAM_CLOSED.code()); + Thread.sleep(1100); + listener.onRstStreamRead(ctx, 1, Http2Error.STREAM_CLOSED.code()); + verify(frameListener, times(2)).onRstStreamRead(eq(ctx), anyInt(), eq(Http2Error.STREAM_CLOSED.code())); + } +}
944332bb15bdImprovements to HTTP/2 overhead protection.
4 files changed · +31 −2
java/org/apache/coyote/http2/Http2Protocol.java+18 −1 modified@@ -63,8 +63,10 @@ public class Http2Protocol implements UpgradeProtocol { // Maximum amount of streams which can be concurrently executed over // a single connection static final int DEFAULT_MAX_CONCURRENT_STREAM_EXECUTION = 20; - + // Default factor used when adjusting overhead count for overhead frames static final int DEFAULT_OVERHEAD_COUNT_FACTOR = 10; + // Default factor used when adjusting overhead count for reset frames + static final int DEFAULT_OVERHEAD_RESET_FACTOR = 50; // Not currently configurable. This makes the practical limit for // overheadCountFactor to be ~20. The exact limit will vary with traffic // patterns. @@ -98,6 +100,7 @@ public class Http2Protocol implements UpgradeProtocol { private int maxTrailerCount = Constants.DEFAULT_MAX_TRAILER_COUNT; private int maxTrailerSize = Constants.DEFAULT_MAX_TRAILER_SIZE; private int overheadCountFactor = DEFAULT_OVERHEAD_COUNT_FACTOR; + private int overheadResetFactor = DEFAULT_OVERHEAD_RESET_FACTOR; private int overheadContinuationThreshold = DEFAULT_OVERHEAD_CONTINUATION_THRESHOLD; private int overheadDataThreshold = DEFAULT_OVERHEAD_DATA_THRESHOLD; private int overheadWindowUpdateThreshold = DEFAULT_OVERHEAD_WINDOW_UPDATE_THRESHOLD; @@ -339,6 +342,20 @@ public void setOverheadCountFactor(int overheadCountFactor) { } + public int getOverheadResetFactor() { + return overheadResetFactor; + } + + + public void setOverheadResetFactor(int overheadResetFactor) { + if (overheadResetFactor < 0) { + this.overheadResetFactor = 0; + } else { + this.overheadResetFactor = overheadResetFactor; + } + } + + public int getOverheadContinuationThreshold() { return overheadContinuationThreshold; }
java/org/apache/coyote/http2/Http2UpgradeHandler.java+2 −0 modified@@ -1812,6 +1812,7 @@ public void reset(int streamId, long errorCode) throws Http2Exception { log.debug(sm.getString("upgradeHandler.reset.receive", getConnectionId(), Integer.toString(streamId), Long.toString(errorCode))); } + increaseOverheadCount(FrameType.RST, getProtocol().getOverheadResetFactor()); AbstractNonZeroStream abstractNonZeroStream = getAbstractNonZeroStream(streamId, true); abstractNonZeroStream.checkState(FrameType.RST); if (abstractNonZeroStream instanceof Stream) { @@ -1945,6 +1946,7 @@ public void incrementWindowSize(int streamId, int increment) throws Http2Excepti @Override public void priorityUpdate(int prioritizedStreamID, Priority p) throws Http2Exception { + increaseOverheadCount(FrameType.PRIORITY_UPDATE); AbstractNonZeroStream abstractNonZeroStream = getAbstractNonZeroStream(prioritizedStreamID, true); if (abstractNonZeroStream instanceof Stream) { Stream stream = (Stream) abstractNonZeroStream;
webapps/docs/changelog.xml+3 −0 modified@@ -163,6 +163,9 @@ <fix> Align validation of HTTP trailer fields with standard fields. (markt) </fix> + <fix> + Improvements to HTTP/2 overhead protection. (markt) + </fix> </changelog> </subsection> <subsection name="Jasper">
webapps/docs/config/http2.xml+8 −1 modified@@ -222,14 +222,21 @@ count starts at <code>-10 * overheadCountFactor</code>. The count is decreased by 20 for each data frame sent or received and each headers frame received. The count is increased by the <code>overheadCountFactor</code> - for each setting received, priority frame received and ping received. If + for each setting, priority, priority update and ping frame received. If the overhead count exceeds zero, the connection is closed. A value of less than <code>1</code> disables this protection. In normal usage a value of approximately <code>20</code> or higher will close the connection before any streams can complete. If not specified, a default value of <code>10</code> will be used.</p> </attribute> + <attribute name="overheadResetFactor" required="false"> + <p>The amount by which the overhead count (see + <strong>overheadCountFactor</strong>) will be increased for each reset + frame received. If not specified, a default value of <code>50</code> will + be used. A value of less than zero will be treated as zero.</p> + </attribute> + <attribute name="overheadDataThreshold" required="false"> <p>The threshold below which the average payload size of the current and previous non-final <code>DATA</code> frames will trigger an increase in
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
246- cgit.freebsd.org/ports/commit/nvdMailing ListPatchVendor Advisory
- gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088nvdIssue TrackingPatch
- github.com/advisories/GHSA-vx74-f528-fxqgnvdMitigationPatchVendor Advisory
- github.com/advisories/GHSA-xpw8-rcwv-8f8pnvdPatchVendor Advisory
- github.com/apache/trafficserver/pull/10564nvdIssue TrackingPatch
- github.com/envoyproxy/envoy/pull/30055nvdIssue TrackingPatch
- github.com/etcd-io/etcd/issues/16740nvdIssue TrackingPatch
- github.com/facebook/proxygen/pull/466nvdIssue TrackingPatch
- github.com/grpc/grpc-go/pull/6703nvdIssue TrackingPatch
- github.com/h2o/h2o/pull/3291nvdIssue TrackingPatch
- github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1nvdPatch
- github.com/kubernetes/kubernetes/pull/121120nvdIssue TrackingPatch
- github.com/line/armeria/pull/5232nvdIssue TrackingPatch
- github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632nvdPatch
- github.com/microsoft/CBL-Mariner/pull/6381nvdIssue TrackingPatch
- github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61nvdPatch
- github.com/nghttp2/nghttp2/pull/1961nvdIssue TrackingPatch
- github.com/opensearch-project/data-prepper/issues/3474nvdIssue TrackingPatch
- github.com/projectcontour/contour/pull/5826nvdIssue TrackingPatch
- mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.htmlnvdMailing ListPatchThird Party Advisory
- msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/nvdPatchVendor Advisory
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487nvdMitigationPatchVendor Advisory
- security.netapp.com/advisory/ntap-20240621-0006/nvdExploitThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/10/6nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/10/7nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/13/4nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/13/9nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/18/4nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/18/8nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/19/6nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/20/8nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2025/08/13/6nvdThird Party Advisory
- access.redhat.com/security/cve/cve-2023-44487nvdVendor Advisory
- arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/nvdPress/Media CoverageThird Party Advisory
- aws.amazon.com/security/security-bulletins/AWS-2023-011/nvdThird Party Advisory
- blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/nvdTechnical DescriptionVendor Advisory
- blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/nvdThird Party AdvisoryVendor Advisory
- blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/nvdVendor Advisory
- blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attacknvdPress/Media CoverageThird Party Advisory
- blog.vespa.ai/cve-2023-44487/nvdVendor Advisory
- bugzilla.proxmox.com/show_bug.cginvdIssue TrackingThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingVendor Advisory
- bugzilla.suse.com/show_bug.cginvdIssue TrackingVendor Advisory
- cert-portal.siemens.com/productcert/html/ssa-082556.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-341067.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-784301.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-832273.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-915275.htmlnvdThird Party Advisory
- cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/nvdTechnical DescriptionVendor Advisory
- cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attacknvdTechnical DescriptionVendor Advisory
- community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125nvdVendor Advisory
- discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715nvdThird Party Advisory
- forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764nvdVendor Advisory
- github.com/advisories/GHSA-qppj-fm5r-hxr3nvdVendor AdvisoryADVISORY
- github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2nvdProductThird Party Advisory
- github.com/arkrwn/PoC/tree/main/CVE-2023-44487nvdVendor Advisory
- github.com/caddyserver/caddy/issues/5877nvdIssue TrackingVendor Advisory
- github.com/caddyserver/caddy/releases/tag/v2.7.5nvdRelease NotesThird Party Advisory
- github.com/dotnet/announcements/issues/277nvdIssue TrackingMitigationVendor Advisory
- github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqfnvdVendor Advisory
- groups.google.com/g/golang-announce/c/iNNxDTCjZvonvdMailing ListRelease NotesVendor Advisory
- istio.io/latest/news/security/istio-security-2023-004/nvdVendor Advisory
- linkerd.io/2023/10/12/linkerd-cve-2023-44487/nvdVendor Advisory
- lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/nvdMailing ListThird Party Advisory
- lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.htmlnvdMailing ListThird Party Advisory
- martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.htmlnvdThird Party Advisory
- my.f5.com/manage/s/article/K000137106nvdVendor Advisory
- netty.io/news/2023/10/10/4-1-100-Final.htmlnvdRelease NotesVendor Advisory
- openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/nvdThird Party Advisory
- seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffectednvdThird Party Advisory
- sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZnvdVendor Advisory
- security.gentoo.org/glsa/202311-09nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20231016-0001/nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20240426-0007/nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20240621-0007/nvdThird Party Advisory
- security.paloaltonetworks.com/CVE-2023-44487nvdVendor Advisory
- ubuntu.com/security/CVE-2023-44487nvdVendor Advisory
- www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/nvdThird Party Advisory
- www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487nvdThird Party AdvisoryUS Government Resource
- www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-eventnvdPress/Media CoverageThird Party Advisory
- www.debian.org/security/2023/dsa-5521nvdMailing ListVendor Advisory
- www.debian.org/security/2023/dsa-5522nvdMailing ListVendor Advisory
- www.debian.org/security/2023/dsa-5540nvdMailing ListThird Party Advisory
- www.debian.org/security/2023/dsa-5549nvdMailing ListThird Party Advisory
- www.debian.org/security/2023/dsa-5558nvdMailing ListThird Party Advisory
- www.debian.org/security/2023/dsa-5570nvdThird Party Advisory
- www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487nvdThird Party AdvisoryVendor Advisory
- www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/nvdVendor Advisory
- www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/nvdMitigationVendor Advisory
- www.openwall.com/lists/oss-security/2023/10/10/6nvdMailing ListThird Party Advisory
- www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/nvdPress/Media CoverageThird Party Advisory
- www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-causenvdThird Party Advisory
- edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cvenvdBroken Link
- github.com/Azure/AKS/issues/3947nvdIssue Tracking
- github.com/akka/akka-http/issues/4323nvdIssue Tracking
- github.com/alibaba/tengine/issues/1872nvdIssue Tracking
- github.com/apache/apisix/issues/10320nvdIssue Tracking
- github.com/apache/httpd-site/pull/10nvdIssue Tracking
- github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.cnvdProduct
- github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.mdnvdProductRelease Notes
- github.com/eclipse/jetty.project/issues/10679nvdIssue Tracking
- github.com/golang/go/issues/63417nvdIssue Tracking
- github.com/grpc/grpc/releases/tag/v1.59.2nvdMailing List
- github.com/haproxy/haproxy/issues/2312nvdIssue Tracking
- github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.mdnvdProduct
- github.com/junkurihara/rust-rpxy/issues/97nvdIssue Tracking
- github.com/kazu-yamamoto/http2/issues/93nvdIssue Tracking
- github.com/nghttp2/nghttp2/releases/tag/v1.57.0nvdRelease Notes
- github.com/ninenines/cowboy/issues/1615nvdIssue Tracking
- github.com/nodejs/node/pull/50121nvdIssue Tracking
- github.com/openresty/openresty/issues/930nvdIssue Tracking
- github.com/tempesta-tech/tempesta/issues/1986nvdIssue Tracking
- github.com/varnishcache/varnish-cache/issues/3996nvdIssue Tracking
- lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87qnvdMailing List
- lists.debian.org/debian-lts-announce/2023/10/msg00023.htmlnvdMailing List
- lists.debian.org/debian-lts-announce/2023/10/msg00024.htmlnvdMailing List
- lists.debian.org/debian-lts-announce/2023/10/msg00045.htmlnvdMailing List
- lists.debian.org/debian-lts-announce/2023/10/msg00047.htmlnvdMailing List
- lists.debian.org/debian-lts-announce/2023/11/msg00001.htmlnvdMailing List
- lists.debian.org/debian-lts-announce/2023/11/msg00012.htmlnvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/nvdMailing List
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/nvdMailing List
- news.ycombinator.com/itemnvdIssue Tracking
- news.ycombinator.com/itemnvdIssue TrackingPress/Media Coverage
- news.ycombinator.com/itemnvdIssue Tracking
- news.ycombinator.com/itemnvdIssue Tracking
- tomcat.apache.org/security-10.htmlnvdRelease Notes
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
- www.phoronix.com/news/HTTP2-Rapid-Reset-AttacknvdPress/Media Coverage
- akka.io/security/akka-http-cve-2023-44487.htmlghsa
- arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-sizeghsa
- aws.amazon.com/security/security-bulletins/AWS-2023-011ghsa
- blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attackghsa
- blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attackghsa
- blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerabliltyghsa
- blog.vespa.ai/cve-2023-44487ghsa
- chaos.social/@icing/111210915918780532ghsa
- cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rpsghsa
- github.com/akka/akka-http/pull/4324ghsa
- github.com/akka/akka-http/pull/4325ghsa
- github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628ghsa
- github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3ghsa
- github.com/hyperium/hyper/issues/3337ghsa
- go.dev/cl/534215ghsa
- go.dev/cl/534235ghsa
- go.dev/issue/63417ghsa
- groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJghsa
- istio.io/latest/news/security/istio-security-2023-004ghsa
- linkerd.io/2023/10/12/linkerd-cve-2023-44487ghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LIghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4Aghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2ghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5ghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVUghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TYghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQEghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBGghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7ULghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVUghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NKghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZXghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUHghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Yghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2ghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRTghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3ghsa
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4ghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LIghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4Aghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2ghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5ghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVUghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TYghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQEghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBGghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7ULghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVUghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NKghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZXghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUHghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Yghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2ghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRTghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3ghsa
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4ghsa
- msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2ghsa
- nvd.nist.gov/vuln/detail/CVE-2023-44487ghsa
- openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-responseghsa
- security.netapp.com/advisory/ntap-20231016-0001ghsa
- security.netapp.com/advisory/ntap-20240426-0007ghsa
- security.netapp.com/advisory/ntap-20240621-0006ghsa
- security.netapp.com/advisory/ntap-20240621-0007ghsa
- tomcat.apache.org/security-11.htmlghsa
- tomcat.apache.org/security-8.htmlghsa
- tomcat.apache.org/security-9.htmlghsa
- www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-recordsghsa
- www.eclipse.org/lists/jetty-announce/msg00181.htmlghsa
- www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487ghsa
- www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-productsghsa
- www.theregister.com/2023/10/10/http2_rapid_reset_zerodayghsa
News mentions
0No linked articles in our index yet.