git: e69764d9dcba - main - security/vuxml: add h2o-devel vuln details

From: Dave Cottlehuber <dch_at_FreeBSD.org>
Date: Wed, 02 Feb 2022 12:48:56 UTC
The branch main has been updated by dch:

URL: https://cgit.FreeBSD.org/ports/commit/?id=e69764d9dcba833f8926926f55a5630d8cb5e47b

commit e69764d9dcba833f8926926f55a5630d8cb5e47b
Author:     Dave Cottlehuber <dch@FreeBSD.org>
AuthorDate: 2022-02-02 12:46:02 +0000
Commit:     Dave Cottlehuber <dch@FreeBSD.org>
CommitDate: 2022-02-02 12:48:15 +0000

    security/vuxml: add h2o-devel vuln details
    
    Security:       CVE-2021-43848
---
 security/vuxml/vuln-2022.xml | 38 ++++++++++++++++++++++++++++++++++++++
 1 file changed, 38 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 03cef361acd5..4f4068dff9f1 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,41 @@
+  <vuln vid="1d3677a8-9143-42d8-84a3-0585644dff4b">
+    <topic>h2o -- uninitialised memory access in HTTP3</topic>
+    <affects>
+      <package>
+	<name>h2o-devel</name>
+	<range><lt>2.3.0.d.20220131</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Emil Lerner reports:</p>
+	<blockquote cite="https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4">
+       <p>When receiving QUIC frames in certain order, HTTP/3 server-side
+       implementation of h2o can be misguided to treat uninitialized
+       memory as HTTP/3 frames that have been received. When h2o is
+       used as a reverse proxy, an attacker can abuse this vulnerability
+       to send internal state of h2o to backend servers controlled by
+       the attacker or third party. Also, if there is an HTTP endpoint
+       that reflects the traffic sent from the client, an attacker can
+       use that reflector to obtain internal state of h2o.</p>
+       <p>This internal state includes traffic of other connections in
+       unencrypted form and TLS session tickets.</p>
+       <p>This vulnerability exists in h2o server with HTTP/3
+       support, between commit 93af138 and d1f0f65. None of the
+       released versions of h2o are affected by this vulnerability.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2021-43848</cvename>
+      <url>https://github.com/h2o/h2o/security/advisories/GHSA-f9xw-j925-m4m4</url>
+    </references>
+    <dates>
+      <discovery>2021-01-31</discovery>
+      <entry>2022-02-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b1b6d623-83e4-11ec-90de-1c697aa5a594">
     <topic>FreeBSD -- vt console buffer overflow</topic>
     <affects>