Source: h2o X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for h2o. CVE-2024-45403[0]: | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | When h2o is configured as a reverse proxy and HTTP/3 requests are | cancelled by the client, h2o might crash due to an assertion | failure. The crash can be exploited by an attacker to mount a | Denial-of-Service attack. By default, the h2o standalone server | automatically restarts, minimizing the impact. However, HTTP | requests that were served concurrently will still be disrupted. The | vulnerability has been addressed in commit 1ed32b2. Users may | disable the use of HTTP/3 to mitigate the issue. https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92 https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562 https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c CVE-2024-45397[1]: | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | When an HTTP request using TLS/1.3 early data on top of TCP Fast | Open or QUIC 0-RTT packets is received and the IP-address-based | access control is used, the access control does not detect and | prohibit HTTP requests conveyed by packets with a spoofed source | address. This behavior allows attackers on the network to execute | HTTP requests from addresses that are otherwise rejected by the | address-based access control. The vulnerability has been addressed | in commit 15ed15a. Users may disable the use of TCP FastOpen and | QUIC to mitigate the issue. https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a CVE-2024-25622[2]: | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. | The configuration directives provided by the headers handler allows | users to modify the response headers being sent by h2o. The | configuration file of h2o has scopes, and the inner scopes (e.g., | path level) are expected to inherit the configuration defined in | outer scopes (e.g., global level). However, if a header directive is | used in the inner scope, all the definition in outer scopes are | ignored. This can lead to headers not being modified as expected. | Depending on the headers being added or removed unexpectedly, this | behavior could lead to unexpected client behavior. This | vulnerability is fixed in commit | 123f5e2b65dcdba8f7ef659a00d24bd1249141be. https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj https://github.com/h2o/h2o/issues/3332 https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-45403 https://www.cve.org/CVERecord?id=CVE-2024-45403 [1] https://security-tracker.debian.org/tracker/CVE-2024-45397 https://www.cve.org/CVERecord?id=CVE-2024-45397 [2] https://security-tracker.debian.org/tracker/CVE-2024-25622 https://www.cve.org/CVERecord?id=CVE-2024-25622 Please adjust the affected versions in the BTS as needed.