Files
poky/meta/recipes-devtools
Soumya Sambu 7262c0f235 go: Fix CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver
reading from a request or response body to read many more bytes from
the network than are in the body. A malicious HTTP client can further
exploit this to cause a server to automatically read a large amount
of data (up to about 1GiB) when a handler fails to read the entire
body of a request. Chunk extensions are a little-used HTTP feature
which permit including additional metadata in a request or response
body sent using the chunked encoding. The net/http chunked encoding
reader discards this metadata. A sender can exploit this by inserting
a large metadata segment with each byte transferred. The chunk reader
now produces an error if the ratio of real body to encoded bytes grows
too small.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-39326
https://security-tracker.debian.org/tracker/CVE-2023-39326

(From OE-Core rev: 448df3bb9277287dd8586987199223b7314fdd01)

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-12-22 16:36:55 -10:00
..
2023-08-26 04:24:02 -10:00
2023-11-28 05:00:32 -10:00
2023-10-05 15:48:49 -10:00
2021-11-25 21:55:10 +00:00
2022-03-16 10:31:40 +00:00
2022-08-01 16:27:29 +01:00
2022-03-16 13:39:12 +00:00
2023-09-08 16:09:41 -10:00
2023-09-18 04:28:04 -10:00
2023-05-30 04:11:15 -10:00
2021-11-03 10:12:42 +00:00
2022-03-24 17:45:29 +00:00
2023-12-22 16:36:55 -10:00
2023-10-05 15:48:49 -10:00
2022-05-25 22:45:50 +01:00
2022-03-23 12:13:49 +00:00
2022-03-11 06:56:01 +00:00
2022-05-25 22:45:50 +01:00
2022-12-01 19:35:05 +00:00
2022-03-20 00:02:22 +00:00
2023-09-08 16:09:41 -10:00
2021-08-02 15:44:10 +01:00
2023-07-21 06:27:34 -10:00
2023-03-23 22:45:33 +00:00
2023-12-22 16:36:54 -10:00
2022-03-02 18:43:24 +00:00
2023-09-30 09:43:59 -10:00
2022-05-04 13:07:33 +01:00
2021-12-08 20:22:10 +00:00