GHSA-xvr7-p2c6-j83w

Suggest an improvement
Source
https://github.com/advisories/GHSA-xvr7-p2c6-j83w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-xvr7-p2c6-j83w/GHSA-xvr7-p2c6-j83w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xvr7-p2c6-j83w
Published
2025-08-13T23:54:02Z
Modified
2025-08-13T23:54:02Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
swift-nio-http2 affected by HTTP/2 MadeYouReset vulnerability
Details

The HTTP/2 MadeYouReset vulnerability has a mild effect on swift-nio-http2.

swift-nio-http2 mostly protects against MadeYouReset by using a number of existing denial-of-service prevention patterns that we added in response to the RapidReset vulnerabilities. The result is that servers are not vulnerable to naive attacks based on MadeYouReset, and the naive PoC examples do not affect swift-nio-http2.

However, in 1.38.0 we added some defense-in-depth measures as a precautionary measure that detect clients behaving "weirdly". These defense in depth measures tackle resource drain attacks where attackers interleave attack traffic with legitimate traffic to try to evade our existing DoS prevention mechanisms.

We recommend all adopters move to 1.38.0 as soon as possible to mitigate against more sophisticated attacks that may appear in the future.

We are very grateful to @galbarnahum, @AnatBB, and @YanivRL for their reporting and assistance with our process.

Database specific
{
    "github_reviewed_at": "2025-08-13T23:54:02Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-405"
    ],
    "nvd_published_at": null,
    "github_reviewed": true
}
References

Affected packages

SwiftURL / github.com/apple/swift-nio-http2

Package

Name
github.com/apple/swift-nio-http2
Purl
pkg:swift/github.com/apple/swift-nio-http2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.0