Closed aneeshkp closed 2 months ago
@aneeshkp: This pull request references Jira Issue OCPBUGS-41267, which is valid.
No GitHub users were found matching the public email listed for the QA contact in Jira (bblock@redhat.com), skipping review request.
The bug has been updated to refer to the pull request using the external bug tracker.
/cherry-pick release-4.17
@aneeshkp: once the present PR merges, I will cherry-pick it on top of release-4.17 in a new PR and assign it to you.
/cancel cherry-pick release-4.17
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: aneeshkp, nishant-parekh
The full list of commands accepted by this bot can be found here.
The pull request process is described here
@aneeshkp: all tests passed!
Full PR test history. Your PR dashboard.
@aneeshkp: Jira Issue OCPBUGS-41267 is in an unrecognized state (Closed) and will not be moved to the MODIFIED state.
@aneeshkp: #363 failed to apply on top of branch "release-4.17":
Applying: fix cve bugs for http and protobugg
Using index info to reconstruct a base tree...
M go.mod
M go.sum
M vendor/modules.txt
Falling back to patching base and 3-way merge...
Auto-merging vendor/modules.txt
CONFLICT (content): Merge conflict in vendor/modules.txt
Removing vendor/golang.org/x/net/http2/not_go118.go
Removing vendor/golang.org/x/net/http2/not_go115.go
Removing vendor/golang.org/x/net/http2/not_go111.go
Removing vendor/golang.org/x/net/http2/go118.go
Removing vendor/golang.org/x/net/http2/go115.go
Removing vendor/golang.org/x/net/http2/go111.go
Removing vendor/golang.org/x/crypto/internal/poly1305/bits_go1.13.go
Removing vendor/golang.org/x/crypto/internal/poly1305/bits_compat.go
Auto-merging go.sum
Auto-merging go.mod
CONFLICT (content): Merge conflict in go.mod
error: Failed to merge in the changes.
hint: Use 'git am --show-current-patch=diff' to see the failed patch
Patch failed at 0001 fix cve bugs for http and protobugg
When you have resolved this problem, run "git am --continue".
If you prefer to skip this patch, run "git am --skip" instead.
To restore the original branch and stop patching, run "git am --abort".
[ART PR BUILD NOTIFIER]
Distgit: linuxptp-daemon This PR has been included in build ose-linuxptp-daemon-container-v4.18.0-202409130009.p0.g6b9f4e9.assembly.stream.el9. All builds following this will include this PR.
fixes : An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.