Bug 1208553 - VUL-0: CVE-2022-31394: sccache: hyper: max header list size not settable allowing deny of service
Summary: VUL-0: CVE-2022-31394: sccache: hyper: max header list size not settable allo...
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: William Brown
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/357841/
Whiteboard:
Keywords:
Depends on:
Blocks: CVE-2022-31394
  Show dependency treegraph
 
Reported: 2023-02-22 07:54 UTC by Thomas Leroy
Modified: 2024-04-19 08:49 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2023-02-22 07:54:34 UTC
+++ This bug was initially created as a clone of Bug #1208551 +++

CVE-2022-31394

Hyperium Hyper before 0.14.19 does not allow for customization of the
max_header_list_size method in the H2 third-party software, allowing attackers
to perform HTTP2 attacks.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31394
https://www.cve.org/CVERecord?id=CVE-2022-31394
https://github.com/hyperium/hyper/compare/v0.14.18...v0.14.19
https://github.com/hyperium/hyper/issues/2826
https://github.com/hyperium/hyper/pull/2828
Comment 1 Thomas Leroy 2023-02-22 07:55:22 UTC
Affected:

SUSE:SLE-15-SP3:Update/sccache
SUSE:SLE-15-SP4:Update/sccache
openSUSE:Factory/sccache
Comment 8 Maintenance Automation 2023-09-05 12:41:52 UTC
SUSE-SU-2023:3526-1: An update that solves four vulnerabilities and has one security fix can now be installed.

Category: security (important)
Bug References: 1181400, 1194119, 1196972, 1208553, 1212407
CVE References: CVE-2021-45710, CVE-2022-24713, CVE-2022-31394, CVE-2023-1521
Sources used:
openSUSE Leap 15.4 (src): sccache-0.4.2~3-150400.3.3.1
openSUSE Leap 15.5 (src): sccache-0.4.2~3-150400.3.3.1
Development Tools Module 15-SP4 (src): sccache-0.4.2~3-150400.3.3.1
Development Tools Module 15-SP5 (src): sccache-0.4.2~3-150400.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2024-02-27 12:02:30 UTC
SUSE-SU-2023:2637-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1208553, 1212407
CVE References: CVE-2022-31394, CVE-2023-1521
Sources used:
openSUSE Leap 15.3 (src): sccache-0.4.1~18-150300.7.12.1
Development Tools Module 15-SP5 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Linux Enterprise Real Time 15 SP3 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): sccache-0.4.1~18-150300.7.12.1
SUSE Enterprise Storage 7.1 (src): sccache-0.4.1~18-150300.7.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Carlos López 2024-04-19 08:49:20 UTC
Done, closing.