Skip to content

HTTP/2 MadeYouReset vulnerability

Low
Lukasa published GHSA-xvr7-p2c6-j83w Aug 13, 2025

Package

swift swift-nio-http2 (Swift)

Affected versions

<1.38.0

Patched versions

1.38.0

Description

The HTTP/2 MadeYouReset vulnerability has a mild effect on swift-nio-http2.

swift-nio-http2 mostly protects against MadeYouReset by using a number of existing denial-of-service prevention patterns that we added in response to the RapidReset vulnerabilities. The result is that servers are not vulnerable to naive attacks based on MadeYouReset, and the naive PoC examples do not affect swift-nio-http2.

However, in 1.38.0 we added some defense-in-depth measures as a precautionary measure that detect clients behaving "weirdly". These defense in depth measures tackle resource drain attacks where attackers interleave attack traffic with legitimate traffic to try to evade our existing DoS prevention mechanisms.

We recommend all adopters move to 1.38.0 as soon as possible to mitigate against more sophisticated attacks that may appear in the future.

We are very grateful to @galbarnahum, @AnatBB, and @YanivRL for their reporting and assistance with our process.

Severity

Low

CVE ID

No known CVE

Weaknesses

Asymmetric Resource Consumption (Amplification)

The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is asymmetric. Learn more on MITRE.

Credits