[Git][security-tracker-team/security-tracker][master] new h2o issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Oct 12 10:22:06 BST 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0e638ef3 by Moritz Muehlenhoff at 2024-10-12T11:21:45+02:00
new h2o issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -174,11 +174,16 @@ CVE-2024-46215 (A vulnerability was discovered in KM08-708H-v1.1, There is a buf
 CVE-2024-46088 (An arbitrary file upload vulnerability in the ProductAction.entphone i ...)
 	NOT-FOR-US: Zhejiang University Entersoft Customer Resource Management System
 CVE-2024-45403 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Wh ...)
-	TODO: check
+	- h2o <unfixed>
+	NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92
+	NOTE: https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562
+	NOTE: https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c
 CVE-2024-45402 (Picotls is a TLS protocol library that allows users select different c ...)
 	- picotls <itp> (bug #925405)
 CVE-2024-45397 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Wh ...)
-	TODO: check
+	- h2o <unfixed>
+	NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c
+	NOTE: https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a
 CVE-2024-45396 (Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d ...)
 	NOT-FOR-US: Quicly
 CVE-2024-45317 (A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 applianc ...)
@@ -222,7 +227,10 @@ CVE-2024-33579 (A DLL hijack vulnerability was reported in Lenovo Baiying that c
 CVE-2024-33578 (A DLL hijack vulnerability was reported in Lenovo Leyun that could all ...)
 	NOT-FOR-US: Lenovo
 CVE-2024-25622 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. Th ...)
-	TODO: check
+	- h2o <unfixed>
+	NOTE: https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj
+	NOTE: https://github.com/h2o/h2o/issues/3332
+	NOTE: https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be
 CVE-2023-42133 (PAX Android based POS devices allow for escalation of privilege via im ...)
 	NOT-FOR-US: PAX Android based POS devices
 CVE-2024-9779



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e638ef3971a19c06c859cfbee20fda5305f8871
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241012/2b646bd6/attachment.htm>


More information about the debian-security-tracker-commits mailing list