Bugzilla – Bug 1216176
VUL-0: apache2: Rapid reset attack impact (CVE-2023-44487)
Last modified: 2024-05-07 07:48:17 UTC
The Apache2 upstream team posted the following statement about the impact of the "HTTP/2 Rapid Reset Attack" vulnerability. https://github.com/apache/httpd-site/pull/10/commits/0ed0b409383b2ab17c8c04a59b6365c3a27a4920 ## CVE-2023-44487 HTTP/2 'Rapid Reset' {#CVE-2023-44487} Apache HTTP Server is not impacted by the problem described in [CVE-2023-44487](https://www.cve.org/CVERecord?id=CVE-2023-44487): the long-standing measures we have in place to limit excessive load from clients are effective in this scenario. The attack described will cause extra CPU usage on your Apache HTTP Server process, but not impact any backends. As an extra mitigation, if you upgrade the [libnghttp2](http://nghttp2.org/) dependency of `mod_http2` to [at least version 1.57.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0) this will completely remove the impact from Rapid Reset exploits. We are tracking all "HTTP/2 Rapid Reset Attack" related bugs within bsc#1216123.
All done, closing.