git: e69764d9dcba - main - security/vuxml: add h2o-devel vuln details
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 02 Feb 2022 12:48:56 UTC
The branch main has been updated by dch:
URL: https://cgit.FreeBSD.org/ports/commit/?id=e69764d9dcba833f8926926f55a5630d8cb5e47b
commit e69764d9dcba833f8926926f55a5630d8cb5e47b
Author: Dave Cottlehuber <dch@FreeBSD.org>
AuthorDate: 2022-02-02 12:46:02 +0000
Commit: Dave Cottlehuber <dch@FreeBSD.org>
CommitDate: 2022-02-02 12:48:15 +0000
security/vuxml: add h2o-devel vuln details
Security: CVE-2021-43848
---
security/vuxml/vuln-2022.xml | 38 ++++++++++++++++++++++++++++++++++++++
1 file changed, 38 insertions(+)
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 03cef361acd5..4f4068dff9f1 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,41 @@
+ <vuln vid="1d3677a8-9143-42d8-84a3-0585644dff4b">
+ <topic>h2o -- uninitialised memory access in HTTP3</topic>
+ <affects>
+ <package>
+ <name>h2o-devel</name>
+ <range><lt>2.3.0.d.20220131</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Emil Lerner reports:</p>
+ <blockquote cite="https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4">
+ <p>When receiving QUIC frames in certain order, HTTP/3 server-side
+ implementation of h2o can be misguided to treat uninitialized
+ memory as HTTP/3 frames that have been received. When h2o is
+ used as a reverse proxy, an attacker can abuse this vulnerability
+ to send internal state of h2o to backend servers controlled by
+ the attacker or third party. Also, if there is an HTTP endpoint
+ that reflects the traffic sent from the client, an attacker can
+ use that reflector to obtain internal state of h2o.</p>
+ <p>This internal state includes traffic of other connections in
+ unencrypted form and TLS session tickets.</p>
+ <p>This vulnerability exists in h2o server with HTTP/3
+ support, between commit 93af138 and d1f0f65. None of the
+ released versions of h2o are affected by this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-43848</cvename>
+ <url>https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4</url>
+ </references>
+ <dates>
+ <discovery>2021-01-31</discovery>
+ <entry>2022-02-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b1b6d623-83e4-11ec-90de-1c697aa5a594">
<topic>FreeBSD -- vt console buffer overflow</topic>
<affects>