fix(patches): apply Nginx patch for detecting HTTP/2 stream reset attacks early (CVE-2023-44487) #11743
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
fix(patches): apply Nginx patch for detecting HTTP/2 stream reset attacks early (CVE-2023-44487)
From nginx/nginx@6ceef19
Summary
Patch was acquired from here:
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
It was slightly modified to apply cleanly on our nginx-1.21.4 (just small offset differences),
See: https://www.cve.org/CVERecord?id=CVE-2023-44487
SIR-435
Checklist
changelog/unreleased/kong
orskip-changelog
label added on PR if changelog is unnecessary. README.md