HTTP/2 Memory Exhaustion Vulnerability in CVE-2023-44487 Exploit
When a client reset a HTTP/2 stream (using a RST frame), there was a delay in releasing the request's memory. Memory wasn't freed right away but waited until the connection was closed. A client could keep sending new requests and resets, which kept the connection active and increased the memory usage. When the connection finally closed, all memory was freed. However, there was a risk of running out of memory before that happened.
This issue was discovered while testing CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with a custom test client. Under typical HTTP/2 usage, this bug is not likely to cause problems. The increased memory isn't noticed until the connection ends or times out.
It's advised to upgrade to version 2.4.58 to fix this issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server |
||
fedoraproject fedora 37 |
||
fedoraproject fedora 38 |
||
fedoraproject fedora 39 |
||
debian debian linux 10.0 |