Skip to content

Traefik affected by HTTP/2 CONTINUATION flood in net/http

Moderate severity GitHub Reviewed Published Apr 15, 2024 in traefik/traefik • Updated Apr 15, 2024

Package

gomod github.com/traefik/traefik/v2 (Go)

Affected versions

< 2.11.2

Patched versions

2.11.2
gomod github.com/traefik/traefik/v3 (Go)
>= 3.0.0-rc1, < 3.0.0-rc5
3.0.0-rc5

Description

There is a potential vulnerability in Traefik managing HTTP/2 connections.

More details in the CVE-2023-45288.

Patches

Workarounds

No workaround

For more information

If you have any questions or comments about this advisory, please open an issue.

References

@nmengin nmengin published to traefik/traefik Apr 15, 2024
Published to the GitHub Advisory Database Apr 15, 2024
Reviewed Apr 15, 2024
Last updated Apr 15, 2024

Severity

Moderate

EPSS score

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-7f4j-64p6-5h5v

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.