Bug 2163600
| Summary: | CVE-2022-41717 caddy: golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests [epel-9] | |||
|---|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Carl George 🤠<carl> | |
| Component: | caddy | Assignee: | Carl George 🤠<carl> | |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | epel9 | CC: | ahanwate, carl, extras-qa, go-sig, ngompa13 | |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | caddy-2.4.6-5.el9 | Doc Type: | No Doc Update | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | 2163063 | |||
| : | 2163603 (view as bug list) | Environment: | ||
| Last Closed: | 2023-02-02 00:38:41 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2161274 | |||
|
Description
Carl George ðŸ¤
2023-01-24 03:49:12 UTC
FEDORA-EPEL-2023-0478d18bdf has been submitted as an update to Fedora EPEL 9. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-0478d18bdf FEDORA-EPEL-2023-0478d18bdf has been pushed to the Fedora EPEL 9 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-0478d18bdf See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-EPEL-2023-0478d18bdf has been pushed to the Fedora EPEL 9 stable repository. If problem still persists, please make note of it in this bug report. |