[FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E] forgejo -- HTTP/2 CONTINUATION flood in net/http
Severity
High
Affected Packages
1
CVEs
1
security@golang.org reports:
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts
of header data by sending an excessive number of CONTINUATION frames.
Maintaining HPACK state requires parsing and processing all HEADERS
and CONTINUATION frames on a connection. When a request's
headers exceed MaxHeaderBytes, no memory is allocated to store the
excess headers, but they are still parsed. This permits an attacker
to cause an HTTP/2 endpoint to read arbitrary amounts of header
data, all associated with a request which is going to be rejected.
These headers can include Huffman-encoded data which is significantly
more expensive for the receiver to decode than for an attacker to
send. The fix sets a limit on the amount of excess header frames
we will process before closing a connection.
Package | Affected Version |
---|---|
pkg:freebsd/forgejo | < 1.21.8 |
- ID
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- Severity
- high
- Severity from
- CVE-2023-45288
- URL
- http://vuxml.freebsd.org/freebsd/c092be0e-f7cc-11ee-aa6b-b42e991fc52e.html
- Published
-
2024-04-04T00:00:00
(5 months ago) - Modified
-
2024-04-11T00:00:00
(5 months ago) - Rights
- FreeBSD VuXML Security Team
- Other Advisories
-
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2555
- ALAS2-2024-2556
- ALAS2-2024-2568
- ALAS2-2024-2618
- ALPINE:CVE-2023-45288
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-3259
- ELSA-2024-3346
- FEDORA-2024-ce2eefc399
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- GLSA-202408-07
- GO-2024-2687
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:3259
- RHSA-2024:3346
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6886-1
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
FreeBSD VuXML | https://nvd.nist.gov/vuln/detail/CVE-2023-45288 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:freebsd/forgejo | forgejo | < 1.21.8 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |