d66589496e
full diff: https://github.com/golang/net/compare/v0.22.0...v0.23.0 Includes a fix for CVE-2023-45288, which is also addressed in go1.22.2 and go1.21.9; > http2: close connections when receiving too many headers > > Maintaining HPACK state requires that we parse and process > all HEADERS and CONTINUATION frames on a connection. > When a request's headers exceed MaxHeaderBytes, we don't > allocate memory to store the excess headers but we do > parse them. This permits an attacker to cause an HTTP/2 > endpoint to read arbitrary amounts of data, all associated > with a request which is going to be rejected. > > Set a limit on the amount of excess header frames we > will process before closing a connection. > > Thanks to Bartek Nowotarski for reporting this issue. Signed-off-by: Sebastiaan van Stijn <github@gone.nl> |
||
---|---|---|
.. | ||
cloud.google.com/go | ||
code.cloudfoundry.org/clock | ||
dario.cat/mergo | ||
github.com | ||
go.etcd.io | ||
go.opencensus.io | ||
go.opentelemetry.io | ||
go.uber.org | ||
golang.org/x | ||
google.golang.org | ||
gopkg.in | ||
gotest.tools/v3 | ||
k8s.io/klog/v2 | ||
resenje.org/singleflight | ||
sigs.k8s.io/yaml | ||
tags.cncf.io/container-device-interface | ||
modules.txt |