Files
poky/meta/recipes-devtools
Vijay Anusuri a2bf2f28c4 go: Fix CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver
reading from a request or response body to read many more bytes from
the network than are in the body. A malicious HTTP client can further
exploit this to cause a server to automatically read a large amount
of data (up to about 1GiB) when a handler fails to read the entire
body of a request. Chunk extensions are a little-used HTTP feature
which permit including additional metadata in a request or response
body sent using the chunked encoding. The net/http chunked encoding
reader discards this metadata. A sender can exploit this by inserting
a large metadata segment with each byte transferred. The chunk reader
now produces an error if the ratio of real body to encoded bytes grows
too small.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-39326
https://security-tracker.debian.org/tracker/CVE-2023-39326

(From OE-Core rev: 5b55648f3142762c9563289c1b19aa3b7de27164)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-01-05 03:25:38 -10:00
..
2020-09-17 12:51:24 +01:00
2023-12-29 05:29:14 -10:00
2020-02-03 13:03:31 +00:00
2021-05-20 12:36:42 +01:00
2021-12-08 20:28:01 +00:00
2022-06-24 23:57:45 +01:00
2023-09-29 04:29:01 -10:00
2023-05-25 05:49:26 -10:00
2022-03-31 21:09:33 +01:00
2024-01-05 03:25:38 -10:00
2020-09-10 19:07:40 +01:00
2021-10-23 23:14:17 +01:00
2020-03-08 08:21:11 +00:00
2020-05-22 16:23:23 +01:00
2023-10-04 05:17:51 -10:00
2021-01-09 09:17:17 +00:00
2023-12-21 05:17:55 -10:00
2021-06-03 16:30:56 +01:00
2022-12-23 23:05:44 +00:00
2022-09-23 16:22:59 +01:00
2021-03-18 21:20:24 +00:00