Date: Wed, 2 Feb 2022 12:48:56 GMT From: Dave Cottlehuber <dch@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: e69764d9dcba - main - security/vuxml: add h2o-devel vuln details Message-ID: <202202021248.212CmunT063810@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by dch: URL: https://cgit.FreeBSD.org/ports/commit/?id=e69764d9dcba833f8926926f55a5630d8cb5e47b commit e69764d9dcba833f8926926f55a5630d8cb5e47b Author: Dave Cottlehuber <dch@FreeBSD.org> AuthorDate: 2022-02-02 12:46:02 +0000 Commit: Dave Cottlehuber <dch@FreeBSD.org> CommitDate: 2022-02-02 12:48:15 +0000 security/vuxml: add h2o-devel vuln details Security: CVE-2021-43848 --- security/vuxml/vuln-2022.xml | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 03cef361acd5..4f4068dff9f1 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,41 @@ + <vuln vid="1d3677a8-9143-42d8-84a3-0585644dff4b"> + <topic>h2o -- uninitialised memory access in HTTP3</topic> + <affects> + <package> + <name>h2o-devel</name> + <range><lt>2.3.0.d.20220131</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Emil Lerner reports:</p> + <blockquote cite="https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4"> + <p>When receiving QUIC frames in certain order, HTTP/3 server-side + implementation of h2o can be misguided to treat uninitialized + memory as HTTP/3 frames that have been received. When h2o is + used as a reverse proxy, an attacker can abuse this vulnerability + to send internal state of h2o to backend servers controlled by + the attacker or third party. Also, if there is an HTTP endpoint + that reflects the traffic sent from the client, an attacker can + use that reflector to obtain internal state of h2o.</p> + <p>This internal state includes traffic of other connections in + unencrypted form and TLS session tickets.</p> + <p>This vulnerability exists in h2o server with HTTP/3 + support, between commit 93af138 and d1f0f65. None of the + released versions of h2o are affected by this vulnerability.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-43848</cvename> + <url>https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4</url> + </references> + <dates> + <discovery>2021-01-31</discovery> + <entry>2022-02-02</entry> + </dates> + </vuln> + <vuln vid="b1b6d623-83e4-11ec-90de-1c697aa5a594"> <topic>FreeBSD -- vt console buffer overflow</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202202021248.212CmunT063810>