Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 5 Apr 2024 14:11:49 -0400
From: Jan Schaumann <>
Subject: Go 1.22.2 and 1.21.9 (CVE-2023-45288 HTTP/2 CONTINUATION issue)

[ Forwarding another announcement I didn't see on this
list relating to VU#421644 ]

| We have just released Go versions 1.22.2 and 1.21.9,
| minor point releases.
| These minor releases include 1 security fixes
| following the security policy:
| http2: close connections when receiving too many
| headers
| Maintaining HPACK state requires that we parse and
| process all HEADERS and CONTINUATION frames on a
| connection. When a request's headers exceed
| MaxHeaderBytes, we don't allocate memory to store the
| excess headers but we do parse them. This permits an
| attacker to cause an HTTP/2 endpoint to read arbitrary
| amounts of header data, all associated with a request
| which is going to be rejected. These headers can
| include Huffman-encoded data which is significantly
| more expensive for the receiver to decode than for an
| attacker to send.
| Set a limit on the amount of excess header frames we
| will process before closing a connection.
| Thanks to Bartek Nowotarski (
| for reporting this issue.
| This is CVE-2023-45288 and Go issue
| View the release notes for more information:
| You can download binary and source distributions from
| the Go website:
| To compile from source using a Git clone, update to
| the release with
| git checkout go1.22.2 and build as usual.
| Thanks to everyone who contributed to the releases.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.