CVE Vulnerabilities

CVE-2023-45802

Improper Resource Shutdown or Release

Published: Oct 23, 2023 | Modified: Aug 25, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the requests memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.

This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During normal HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.4.17 (including)2.4.58 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:1.15.19-32.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:1.15.19-32.el7jbcs*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8100020240405103607.e155f54d*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHathttpd:2.4-8080020240502175002.63b34585*
Red Hat Enterprise Linux 9RedHatmod_http2-0:2.0.26-1.el9*
Text-Only JBCSRedHat*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntufocal*
Apache2Ubuntujammy*
Apache2Ubuntulunar*
Apache2Ubuntumantic*
Apache2Ubuntunoble*
Apache2Ubuntuoracular*
Apache2Ubuntuplucky*
Apache2Ubuntuquesting*
Apache2Ubuntutrusty*
Apache2Ubuntuupstream*
Apache2Ubuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References