-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in net/http: CVE-2023-39325 #2102
Labels
Comments
Change https://go.dev/cl/534240 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Oct 11, 2023
Aliases: CVE-2023-44487, CVE-2023-39325 Updates #2102 Change-Id: If4004559d848991502c667c4c4c4b8e1fba3c3ea Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/534240 Reviewed-by: Damien Neil <dneil@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
This was referenced Oct 11, 2023
tatianab
changed the title
x/vulndb: potential Go vuln in <placeholder>: CVE-2023-39325
x/vulndb: potential Go vuln in net/http: CVE-2023-39325
Oct 11, 2023
Change https://go.dev/cl/545204 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Nov 27, 2023
Move CVE-2023-44487 (catch-all for HTTP/2 rapid reset) from "cves" to "related". Updates #2102 Change-Id: Ic420f27cb55ab46f131957dcf941744aae3e0af0 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/545204 Reviewed-by: Damien Neil <dneil@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CVE ID
CVE-2023-39325
GHSA ID
No response
Additional information
Placeholder issue for CVE-2023-39325
The text was updated successfully, but these errors were encountered: