SUSE Support

Here When You Need Us

Security vulnerability: CVE-2025-8671: HTTP/2 'MadeYouReset' DoS attack

This document (000021980) is provided subject to the disclaimer at the end of this document.

Environment

Situation

Researchers from the Tel Aviv University have recently discovered a vulnerability in several HTTP/2 implementations, which can be exploited to cause denial of service in applications that depend on these implementations. The vulnerability, which was assigned CVE-2025-8671, is now known as 'MadeYouReset'. 

Resolution

Several upstream projects have updated their code to implement a fix for the issue, and have also provided patches that allow the vulnerability to be addressed in versions of their software shipped with SUSE products.

The following packages are affected:
- netty
- jetty
- tomcat

Please monitor the SUSE CVE announcements for the availability of the updated packages.

Cause

The 'MadeYouReset' vulnerability is caused by a flaw in HTTP/2 implementations, when they treat a stream reset operation as a stream close operation, and the server still continues to process the stream. By sending several and continuous reset requests to a target server, an attacker can overload it, since requests will be processed, even though the reset streams are considered to be closed in the protocol level.

This is not a flaw in the HTTP/2 protocol, but rather a flaw in implementations of this protocol. In HTTP/2, both client and server are allowed to close streams at any time. Certain implementations, however, continue to process requests and generate responses, even when such responses will not be sent back to the client, due to the stream being considered closed. A mismatch, therefore, happens, where the amount of actual HTTP requests being processed by the backend server is not the same as the amount of streams that are considered active from the protocol perspective. Therefore, by opening streams and then rapidly causing a server to reset them through the use of malformed frames or flow control errors, an attacker can exploit the previously mentioned mismatch. The server will try to handle an unbounded number of concurrent HTTP/2 requests on a single connection, leading to resource exhaustion.

When targeted, a server will either exhaust its memory or its processing capabilities, which can lead to a crash (and the service then becomes completely offline), or to the limitation on the number of client connections that can be handled at a given time (and the service then becomes intermittent and/or takes long to respond to client requests).  

The 'MadeYouReset' vulnerability is similar to, but not the same as the 'RapidReset' vulnerability (CVE-2023-44487,
https://www.suse.com/support/kb/doc/?id=000021240). Information on 'MadeYouReset' have been publicly disclosed on August 13, 2025, and prior to this date, there was no record of any 'MadeYouReset' attacks happening in the wild.

Additional Information

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:000021980
  • Creation Date: 13-Aug-2025
  • Modified Date:01-Sep-2025
    • SUSE Linux Enterprise Server
    • SUSE Linux Enterprise Server for SAP Applications

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com

tick icon

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

tick icon

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

tick icon

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.