Bug 2163600
Summary: | CVE-2022-41717 caddy: golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests [epel-9] | |||
---|---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Carl George 🤠<carl> | |
Component: | caddy | Assignee: | Carl George 🤠<carl> | |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
Severity: | medium | Docs Contact: | ||
Priority: | unspecified | |||
Version: | epel9 | CC: | ahanwate, carl, extras-qa, go-sig, ngompa13 | |
Target Milestone: | --- | Keywords: | Security, SecurityTracking | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | caddy-2.4.6-5.el9 | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | ||
Clone Of: | 2163063 | |||
: | 2163603 (view as bug list) | Environment: | ||
Last Closed: | 2023-02-02 00:38:41 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2161274 |
Description
Carl George ðŸ¤
2023-01-24 03:49:12 UTC
FEDORA-EPEL-2023-0478d18bdf has been submitted as an update to Fedora EPEL 9. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-0478d18bdf FEDORA-EPEL-2023-0478d18bdf has been pushed to the Fedora EPEL 9 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-0478d18bdf See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-EPEL-2023-0478d18bdf has been pushed to the Fedora EPEL 9 stable repository. If problem still persists, please make note of it in this bug report. |