On April 4, 2023, Go published CVE-2023-24534 and CVE-2023-24536. These describe a vulnerability in Go when parsing the HTTP headers, which impacts Traefik.
With this vulnerability, HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service.
As of April 12, 2023, We have patched this vulnerability with Traefik Proxy 2.9.10 and Traefik Proxy 2.10.0-rc2.
If you have any questions or comments about this advisory, please open an issue.