Home

Description

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.

PUBLISHED Reserved 2025-08-06 | Published 2025-08-13 | Updated 2025-08-17 | Assigner certcc

Problem types

CWE-404 Improper Resource Shutdown or Release

Product status

15 SP2 before 15-SP5
affected

15 before 15 SP5
affected

6.0.x
affected

6.0LTS
affected

5.x
affected

579ecfa
affected

LTS22
affected

15 SP6 before 15 SP7
affected

15 SP3 before 15 SP7
affected

15 SP3 before 15 SP7
affected

15 SP5 before 15 SP7
affected

12 SP5 before 15 SP7
affected

15 SP6 before 15 SP7
affected

4.3
affected

4.3
affected

4.3
affected

4.3
affected

15.6
affected

References

galbarnahum.com/made-you-reset

kb.cert.org/vuls/id/767506

varnish-cache.org/security/VSV00017.html

www.fastlystatus.com/incident/377810

github.com/...ommit/4729b661e3c6654198d2cc62997e1af58bef4b80

support2.windriver.com/index.php?page=security-notices

www.suse.com/support/kb/doc/?id=000021980

gitlab.isc.org/isc-projects/bind9/-/issues/5325

github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq

cve.org (CVE-2025-8671)

nvd.nist.gov (CVE-2025-8671)

Download JSON