The latest HTTP/2 DoS seems to affect Go and seems to affect the same products as the last years HTTP/2 "Rapid Reset".
CVE-2023-45288
So just wondering if there is going to be a fix or a statement that it doenst affect traefik proxy.
The latest HTTP/2 DoS seems to affect Go and seems to affect the same products as the last years HTTP/2 "Rapid Reset".
CVE-2023-45288
So just wondering if there is going to be a fix or a statement that it doenst affect traefik proxy.
hoping we can get an answer on this soon.
I'm eagerly waiting for this one as well. I definitely expect Traefik to be vulnerable and await releases for 2.10.x and 2.11.x. Of course, building your own release with a recent/fixed Go would do the trick as well, but a central release makes it easier for everyone.
Maybe @emile , @nicomengin , @svx or @ldez have some insights?
A release will happen quickly.
Looks like v2.11.1 is out now which uses golang 1.22.2 and x/net 0.24.0 which include patches for that CVE: Release v2.11.1 · traefik/traefik · GitHub
net/http, x/net/http2: close connections when receiving too many headers · CVE-2023-45288 · GitHub Advisory Database · GitHub
It would be nice if the CVE was mentioned in the release notes. That would make vulnerability management much easier from end user organization point of view..
I'm also surprised a bit that seemingly the security mailinglist as mentioned on Security Overview · traefik/traefik · GitHub is not used anymore. Last post from 2022, although the referenced CVE search (CVE - Search Results) mentions traefik 4 times in 2023 - but no mentions for this one, which of course is caused in Go, but still relevant for traefik.
I agree, the handling of this issue feels kind of disappointing:
What would I have expected:
This is of course a dream scenario, I don't know what happened in the background, I don't know if the updated dependencies also required code change, but I wish the communication had been handled better. Especially as I expect that a similar update was required for Traefik CE and EE.
This topic was automatically closed 3 days after the last reply. New replies are no longer allowed.
Hello there,
As mentioned in a previous message, we have released Traefik v2.11.2 and v3.0.0-rc5 that embed the bug fix on top of another CVE fix (more details here).
Sorry for the delay, we were waiting for the CVE-2024-28869 to be fixed before communicating on both CVEs.