DockerCLI/vendor/golang.org/x/net
Sebastiaan van Stijn 02b482013c
vendor: golang.org/x/net v0.23.0
full diff: https://github.com/golang/net/compare/v0.22.0...v0.23.0

Includes a fix for CVE-2023-45288, which is also addressed in go1.22.2
and go1.21.9;

> http2: close connections when receiving too many headers
>
> Maintaining HPACK state requires that we parse and process
> all HEADERS and CONTINUATION frames on a connection.
> When a request's headers exceed MaxHeaderBytes, we don't
> allocate memory to store the excess headers but we do
> parse them. This permits an attacker to cause an HTTP/2
> endpoint to read arbitrary amounts of data, all associated
> with a request which is going to be rejected.
>
> Set a limit on the amount of excess header frames we
> will process before closing a connection.
>
> Thanks to Bartek Nowotarski for reporting this issue.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit 5fcbbde4b9)
Signed-off-by: Austin Vazquez <macedonv@amazon.com>
2024-07-22 17:01:43 +00:00
..
http/httpguts vendor: golang.org/x/net v0.0.0-20220906165146-f3363e06e74c 2022-09-06 23:14:47 +02:00
http2 vendor: golang.org/x/net v0.23.0 2024-07-22 17:01:43 +00:00
idna vendor: golang.org/x/net v0.19.0 2024-01-08 10:55:39 +01:00
internal/timeseries vendor: update go-connections for TLS 1.3 support 2023-11-10 15:56:11 +01:00
trace vendor: golang.org/x/net v0.7.0 2023-03-15 01:42:00 +01:00
LICENSE Add vendor 2017-04-17 18:12:58 -04:00
PATENTS Add vendor 2017-04-17 18:12:58 -04:00