moby/vendor/golang.org/x/net/http2/hpack
Sebastiaan van Stijn a36286cf89
vendor: golang.org/x/net v0.7.0
This addresses the same CVE as is patched in go1.19.6. From that announcement:

> net/http: avoid quadratic complexity in HPACK decoding
>
> A maliciously crafted HTTP/2 stream could cause excessive CPU consumption
> in the HPACK decoder, sufficient to cause a denial of service from a small
> number of small requests.
>
> This issue is also fixed in golang.org/x/net/http2 v0.7.0, for users manually
> configuring HTTP/2.
>
> This is CVE-2022-41723 and Go issue https://go.dev/issue/57855.

full diff: https://github.com/golang/net/compare/v0.5.0...v0.7.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-02-14 21:00:09 +01:00
..
encode.go vendor: golang.org/x/net v0.4.0 2022-12-07 22:25:49 +01:00
hpack.go vendor: golang.org/x/net v0.7.0 2023-02-14 21:00:09 +01:00
huffman.go vendor: golang.org/x/net v0.0.0-20220906165146-f3363e06e74c 2022-09-06 22:50:51 +02:00
static_table.go vendor: golang.org/x/net v0.2.0 2022-11-25 17:57:16 +01:00
tables.go vendor: golang.org/x/net v0.2.0 2022-11-25 17:57:16 +01:00