Bug 1216123 (CVE-2023-44487) - VUL-0: CVE-2023-44487: TRACKER-BUG: HTTP/2 Rapid Reset Attack
Summary: VUL-0: CVE-2023-44487: TRACKER-BUG: HTTP/2 Rapid Reset Attack
Status: NEW
Alias: CVE-2023-44487
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/381538/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44487:7.5:(AV:...
Keywords:
Depends on: 1216171 1216181 CVE-2023-45802 CVE-2023-39325 1216169 1216174 1216176 1216182 1216190
Blocks:
  Show dependency treegraph
 
Reported: 2023-10-11 09:25 UTC by Alexander Bergmann
Modified: 2023-12-06 16:24 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-10-11 09:25:26 UTC
TRACKER BUG for the "HTTP/2 Rapid Reset Attack".

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

The "Rapid Reset" vulnerability is not bound to a specific HTTP/2 implementation and affects several systems.
Comment 2 Alexander Bergmann 2023-10-11 10:29:31 UTC
The go language update is tracked in bsc#1216109.
Comment 3 Alexander Bergmann 2023-10-12 13:08:01 UTC
bsc#1216169 - netty: protect against DDOS caused by RST floods
bsc#1216171 - nginx: Rapid reset attack impact
bsc#1216174 - nghttp2: Rapid reset attack impact
bsc#1216176 - apache2: Rapid reset attack impact
bsc#1216181 - haproxy: Rapid reset attack impact 
bsc#1216182 - tomcat: Rapid reset attack impact
Comment 4 Alexander Bergmann 2023-10-12 15:25:04 UTC
bsc#1216190 - nodejs: Rapid reset attack impact
Comment 6 Maintenance Automation 2023-10-26 08:40:09 UTC
SUSE-SU-2023:4200-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
openSUSE Leap Micro 5.3 (src): nghttp2-1.40.0-150200.12.1
openSUSE Leap Micro 5.4 (src): nghttp2-1.40.0-150200.12.1
openSUSE Leap 15.4 (src): nghttp2-1.40.0-150200.12.1, nghttp2-python-1.40.0-150200.12.1
openSUSE Leap 15.5 (src): nghttp2-1.40.0-150200.12.1, nghttp2-python-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.4 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.5 (src): nghttp2-1.40.0-150200.12.1
Basesystem Module 15-SP4 (src): nghttp2-1.40.0-150200.12.1
Basesystem Module 15-SP5 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Proxy 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Retail Branch Server 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Manager Server 4.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Enterprise Storage 7.1 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.1 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro 5.2 (src): nghttp2-1.40.0-150200.12.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): nghttp2-1.40.0-150200.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-10-26 08:40:12 UTC
SUSE-SU-2023:4199-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise Server 12 SP5 (src): nghttp2-1.39.2-3.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): nghttp2-1.39.2-3.13.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-11-20 20:30:01 UTC
SUSE-SU-2023:4492-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1216123, 1216174
CVE References: CVE-2023-44487
Sources used:
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): nghttp2-1.40.0-150000.3.17.1
SUSE CaaS Platform 4.0 (src): nghttp2-1.40.0-150000.3.17.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.17.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): nghttp2-1.40.0-150000.3.17.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 OBSbugzilla Bot 2023-12-01 11:25:04 UTC
This is an autogenerated message for OBS integration:
This bug (1216123) was mentioned in
https://build.opensuse.org/request/show/1130193 Factory / varnish