swift-nio-http2 affected by HTTP/2 MadeYouReset vulnerability
The HTTP/2 MadeYouReset vulnerability has a mild effect on swift-nio-http2.
swift-nio-http2 mostly protects against MadeYouReset by using a number of existing denial-of-service prevention patterns that we added in response to the RapidReset vulnerabilities. The result is that servers are not vulnerable to naive attacks based on MadeYouReset, and the naive PoC examples do not affect swift-nio-http2.
However, in 1.38.0 we added some defense-in-depth measures as a precautionary measure that detect clients behaving "weirdly". These defense in depth measures tackle resource drain attacks where attackers interleave attack traffic with legitimate traffic to try to evade our existing DoS prevention mechanisms.
We recommend all adopters move to 1.38.0 as soon as possible to mitigate against more sophisticated attacks that may appear in the future.
We are very grateful to @galbarnahum, @AnatBB, and @YanivRL for their reporting and assistance with our process.
Affected Packages
Ecosystem | Package | Vulnerable Versions | Patched Version |
---|---|---|---|
swift |
github.com/apple/swift-nio-http2
|
< 1.38.0 |
1.38.0
|
Actions
Advisory Details
Published: | August 13, 2025 21 days ago |
Updated: | August 14, 2025 21 days ago |
CVSS Score: | 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
Source: | Github |
Classification: | GENERAL |
UUID: | GSA_kwCzR0hTQS14dnI3LXAyYzYtajgzd84ABLC_ |