CVE-2023-41337 (https://github.com/h2o/h2o/security/advisories/GHSA-5v5r-rghf-rm6q): h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. In version 2.3.0-beta2 and prior, when h2o is configured to listen to multiple addresses or ports with each of them using different backend servers managed by multiple entities, a malicious backend entity that also has the opportunity to observe or inject packets exchanged between the client and h2o may misdirect HTTPS requests going to other backends and observe the contents of that HTTPS request being sent. The attack involves a victim client trying to resume a TLS connection and an attacker redirecting the packets to a different address or port than that intended by the client. The attacker must already have been configured by the administrator of h2o to act as a backend to one of the addresses or ports that the h2o instance listens to. (Shortened for brevity) CVE-2023-50247 (https://github.com/h2o/h2o/security/advisories/GHSA-2ch5-p59c-7mv6): h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The QUIC stack (quicly), as used by H2O up to commit 43f86e5 (in version 2.3.0-beta and prior), is susceptible to a state exhaustion attack. When H2O is serving HTTP/3, a remote attacker can exploit this vulnerability to progressively increase the memory retained by the QUIC stack. This can eventually cause H2O to abort due to memory exhaustion. The vulnerability has been resolved in commit d67e81d03be12a9d53dc8271af6530f40164cd35. HTTP/1 and HTTP/2 are not affected by this vulnerability as they do not use QUIC. Administrators looking to mitigate this issue without upgrading can disable HTTP/3 support. The above will likely be fixed in 2.3.0.
No upstream release with a fix while patches exist -> upstream/ebuild since we're waiting for a release but the maintainer could also backport the patches (in theory).
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=abd0bfd71ef191a04cfb2c86ba495208d3966efc commit abd0bfd71ef191a04cfb2c86ba495208d3966efc Author: Akinori Hattori <hattya@gentoo.org> AuthorDate: 2024-11-16 13:56:32 +0000 Commit: Akinori Hattori <hattya@gentoo.org> CommitDate: 2024-11-16 14:01:31 +0000 www-servers/h2o: new snapshot Bug: https://bugs.gentoo.org/915567 Bug: https://bugs.gentoo.org/919882 Signed-off-by: Akinori Hattori <hattya@gentoo.org> www-servers/h2o/Manifest | 1 + www-servers/h2o/h2o-2.3.0_pre20241014.ebuild | 105 +++++++++++++++++++++++++++ 2 files changed, 106 insertions(+)