-
Notifications
You must be signed in to change notification settings - Fork 17.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
net/http: close connections when receiving too many headers (CVE-2023-45288) [1.21 backport] #65387
Labels
Milestone
Comments
gopherbot
added
CherryPickCandidate
Used during the release process for point releases
Security
labels
Jan 30, 2024
neild
added
CherryPickApproved
Used during the release process for point releases
and removed
CherryPickCandidate
Used during the release process for point releases
labels
Jan 30, 2024
Deferred pending coordinated disclosure, will reopen when we know what release this goes into. |
Change https://go.dev/cl/576075 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Apr 3, 2024
Disable cmd/internal/moddeps test, since this update includes PRIVATE track fixes. Fixes CVE-2023-45288 For #65051 Fixes #65387 Change-Id: I17da6da2fe0dd70062b49f94377875acb34829a1 Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2197267 Reviewed-by: Dmitri Shuralyov <[email protected]> Run-TryBot: Damien Neil <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]> Reviewed-on: https://go-review.googlesource.com/c/go/+/576075 TryBot-Bypass: Dmitri Shuralyov <[email protected]> Commit-Queue: Dmitri Shuralyov <[email protected]> Auto-Submit: Dmitri Shuralyov <[email protected]> Reviewed-by: Than McIntosh <[email protected]>
Change https://go.dev/cl/576275 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Apr 3, 2024
Done with: go get golang.org/x/[email protected] go mod tidy go mod vendor go generate net/http # zero diff since CL 576075 already did this For CVE-2023-45288. For #65051. For #65387. Change-Id: I336670bdb3df2496c1e8d322c20794042fbc0d02 Reviewed-on: https://go-review.googlesource.com/c/go/+/576275 TryBot-Bypass: Dmitri Shuralyov <[email protected]> Reviewed-by: Than McIntosh <[email protected]> Reviewed-by: Dmitri Shuralyov <[email protected]> Auto-Submit: Dmitri Shuralyov <[email protected]>
dmitshur
changed the title
security: fix CVE-2023-45288 [1.21 backport]
net/http: close connections when receiving too many headers (CVE-2023-45288) [1.21 backport]
Apr 3, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
@neild requested issue #65051 to be considered for backport to the next 1.21 minor release.
The text was updated successfully, but these errors were encountered: