Skip to content

Conversation

miquella
Copy link
Contributor

Change Overview

The Go team announced a security vulnerability in the golang.org/x/net/html package. The vulnerability allowed an attacker to craft an input to ParseFragment that would cause it to enter an infinite loop, causing a denial of service.

This issue has been addressed in version v0.0.0-20210520170846-37e1c6afe023 of the golang.org/x/net module.

Tracking ID: CVE-2021-33194
Announcement: https://groups.google.com/g/golang-announce/c/wPunbCPkWUg

Pull request type

  • 🐛 Bugfix

Issues

  • N/A

Test Plan

N/A

  • 💪 Manual
  • ⚡ Unit test
  • 💚 E2E

The Go team announced a security vulnerability in the
golang.org/x/net/html package. The vulnerability allowed an attacker to
craft an input to ParseFragment that would cause it to enter an
infinite loop, causing a denial of service.

This issue has been addressed in version
v0.0.0-20210520170846-37e1c6afe023 of the golang.org/x/net module.

Tracking ID: CVE-2021-33194
Announcement: https://groups.google.com/g/golang-announce/c/wPunbCPkWUg
@miquella miquella requested review from pavannd1 and julio-lopez May 25, 2021 15:41
@miquella
Copy link
Contributor Author

miquella commented Jun 1, 2021

Thanks for looking at this, @vkamra and @julio-lopez! 🙇

@miquella miquella added the kueue label Jun 1, 2021
@mergify mergify bot merged commit e991690 into master Jun 1, 2021
@mergify mergify bot deleted the upgrade-golang-x-net branch June 1, 2021 22:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants