You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On the latest v1.8.2 tag, govulncheck is reporting a vulnerability (GO-2023-1571):
Vulnerability #1: GO-2023-1571
A maliciously crafted HTTP/2 stream could cause excessive CPU
consumption in the HPACK decoder, sufficient to cause a denial
of service from a small number of small requests.
Found in: golang.org/x/net/[email protected]
Fixed in: golang.org/x/net/[email protected]
More info: https://pkg.go.dev/vuln/GO-2023-1571
Description
On the latest v1.8.2 tag,
govulncheck
is reporting a vulnerability (GO-2023-1571):Pull Request
I think this should fix things: #3505
How to reproduce
Reproduction is the Gin codebase itself.
Run:
Expectations
No vulnerabilities should be reported.
Solution
Bumping the version of golang.org/x/net to v0.7.0 should fix things.
Actual result
Environment
The text was updated successfully, but these errors were encountered: