Skip to content

fix: bump golang.org/x/net to v0.33.0 to mitigate CVE-2024-45338#997

Merged
zhiying-lin merged 1 commit intoAzure:mainfrom
zhiying-lin:fix-cve
Dec 20, 2024
Merged

fix: bump golang.org/x/net to v0.33.0 to mitigate CVE-2024-45338#997
zhiying-lin merged 1 commit intoAzure:mainfrom
zhiying-lin:fix-cve

Conversation

@zhiying-lin
Copy link
Contributor

Description of your changes

There is a new CVE CVE-2024-45338 published yesterday marked with HIGH severity. This CVE impacts the low-level library golang/x/net, which is again, widely used by most components that have network access.

This CVE affects the code path on the golang.org/x/net/html package, on the API calls Parse/ParseXXX functions. This CVE is exploitable if your code is taking direct user input and feeding to the x/net/html function. The previous implementation is subject to denial-of-service attack for handling huge payload with the strings.ToLower call.
Fixes #

I have:

  • Run make reviewable to ensure this PR is ready for review.

How has this code been tested

Special notes for your reviewer

@zhiying-lin zhiying-lin merged commit 63af17f into Azure:main Dec 20, 2024
@zhiying-lin zhiying-lin deleted the fix-cve branch December 20, 2024 06:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants