Bug 1216123 (CVE-2023-44487)

Summary: VUL-0: CVE-2023-44487: TRACKER-BUG: HTTP/2 Rapid Reset Attack
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: abergmann, Andreas.Stieger, gianluca.gabrielli, meissner
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/381538/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44487:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1216171, 1216181, 1216423, 1216109, 1216169, 1216174, 1216176, 1216182, 1216190    
Bug Blocks:    

Description Alexander Bergmann 2023-10-11 09:25:26 UTC
TRACKER BUG for the "HTTP/2 Rapid Reset Attack".

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

The "Rapid Reset" vulnerability is not bound to a specific HTTP/2 implementation and affects several systems.
Comment 2 Alexander Bergmann 2023-10-11 10:29:31 UTC
The go language update is tracked in bsc#1216109.
Comment 3 Alexander Bergmann 2023-10-12 13:08:01 UTC
bsc#1216169 - netty: protect against DDOS caused by RST floods
bsc#1216171 - nginx: Rapid reset attack impact
bsc#1216174 - nghttp2: Rapid reset attack impact
bsc#1216176 - apache2: Rapid reset attack impact
bsc#1216181 - haproxy: Rapid reset attack impact 
bsc#1216182 - tomcat: Rapid reset attack impact
Comment 4 Alexander Bergmann 2023-10-12 15:25:04 UTC
bsc#1216190 - nodejs: Rapid reset attack impact
Comment 6 Maintenance Automation 2023-10-26 08:40:09 UTC
SUSE-SU-2023:4200-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
openSUSE Leap Micro 5.3 (src): nghttp2-1.40.0-150200.12.1
openSUSE Leap Micro 5.4 (src): nghttp2-1.40.0-150200.12.1
openSUSE Leap 15.4 (src): nghttp2-1.40.0-150200.12.1, nghttp2-python-1.40.0-150200.12.1
openSUSE Leap 15.5 (src): nghttp2-1.40.0-150200.12.1, nghttp2-python-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.4 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.5 (src): nghttp2-1.40.0-150200.12.1
Basesystem Module 15-SP4 (src): nghttp2-1.40.0-150200.12.1
Basesystem Module 15-SP5 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Proxy 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Retail Branch Server 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Server 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Enterprise Storage 7.1 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.1 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): nghttp2-1.40.0-150200.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-10-26 08:40:12 UTC
SUSE-SU-2023:4199-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise Server 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): nghttp2-1.39.2-3.13.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-11-20 20:30:01 UTC
SUSE-SU-2023:4492-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): nghttp2-1.40.0-150000.3.17.1
SUSE CaaS Platform 4.0 (src): nghttp2-1.40.0-150000.3.17.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.17.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.17.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 OBSbugzilla Bot 2023-12-01 11:25:04 UTC
This is an autogenerated message for OBS integration:
This bug (1216123) was mentioned in
https://build.opensuse.org/request/show/1130193 Factory / varnish