moby/vendor/golang.org/x/net/websocket
Sebastiaan van Stijn a36286cf89
vendor: golang.org/x/net v0.7.0
This addresses the same CVE as is patched in go1.19.6. From that announcement:

> net/http: avoid quadratic complexity in HPACK decoding
>
> A maliciously crafted HTTP/2 stream could cause excessive CPU consumption
> in the HPACK decoder, sufficient to cause a denial of service from a small
> number of small requests.
>
> This issue is also fixed in golang.org/x/net/http2 v0.7.0, for users manually
> configuring HTTP/2.
>
> This is CVE-2022-41723 and Go issue https://go.dev/issue/57855.

full diff: https://github.com/golang/net/compare/v0.5.0...v0.7.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-02-14 21:00:09 +01:00
..
client.go vendor: update golang/net to c427ad74c 2017-01-13 15:42:11 -08:00
dial.go vendor: update golang/net to c427ad74c 2017-01-13 15:42:11 -08:00
hybi.go vendor: golang.org/x/net v0.7.0 2023-02-14 21:00:09 +01:00
server.go project: use vndr for vendoring 2016-11-03 15:31:46 -07:00
websocket.go vendor: golang.org/x/net v0.5.0 2023-01-17 14:34:05 +01:00