-
Notifications
You must be signed in to change notification settings - Fork 142
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore(deps): Update google.golang.org/grpc and golang.org/x/net
Reason: GHSA-m425-mq94-257g > Impact > > In affected releases of gRPC-Go, it is possible for an attacker to > send HTTP/2 requests, cancel them, and send subsequent requests, which > is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to > launch more concurrent method handlers than the configured maximum > stream limit. > > Patches > > This vulnerability was addressed by #6703 and has been included in > patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the > latest release, 1.59.0. > > Along with applying the patch, users should also ensure they are using > the grpc.MaxConcurrentStreams server option to apply a limit to the > server's resources used for any single connection. > > Workarounds > > None. References: * GHSA-m425-mq94-257g * grpc/grpc-go#6703 Signed-off-by: Balazs Nadasdi <balazs@weave.works>
- Loading branch information
Showing
2 changed files
with
65 additions
and
648 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.