Bump github.com/quic-go/quic-go from 0.33.1 to 0.37.7
Bumps github.com/quic-go/quic-go from 0.33.1 to 0.37.7.
Release notes
Sourced from github.com/quic-go/quic-go's releases.
v0.37.7
This release contains fixes for the Honeybadger vulnerability (CVE-2023-49295):
- limit the number of queued PATH_RESPONSE frames to 256 (#4199)
- don't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.6...v0.37.7
v0.37.6
This patch release contains a backport of quic-go/quic-go#4038.
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.5...v0.37.6
v0.37.5
This patch release contains the backport of 3 fixes:
- fix handshake failure if
tls.Config.SessionTicketDisabled = false, buttls.Config.GetConfigForClientreturns a config that disables session tickets: #4030- use the correct hash function for TLS_AES_256_GCM_SHA384: #4031
- automatically set the
tls.Config.ServerName: #4032Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.4...v0.37.5
v0.37.4
This release contains a fix for a last-minute breaking API change in Go 1.21: quic-go/quic-go#4020
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.3...v0.37.4
v0.37.3
This patch release
- fixes handling of ACK frames serialized after CRYPTO frames: #4018
- sets a
net.Connon thetls.ClientHelloInfoused onGetCertificateandGetConfigForClient, fortls.Configs returned (recursively) fromGetConfigForClient: quic-go/quic-go#4016Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.2...v0.37.3
v0.37.2
This patch release
- contains a backport of the fix that triggered the Go 1.20.7 / 1.19.12 patch release (https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017): quic-go/quic-go#4012
- sets a
net.Connwith the correct addresses on thetls.ClientHelloInfoused intls.Config.GetCertificate: quic-go/quic-go#4015Note that in order to be protected against the DoS attack making use of large RSA keys, it's necessary to update to this patch release (for Go 1.20). For Go 1.21, please update the Go compiler.
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.1...v0.37.2
v0.37.1
This is a patch release fixing two regressions introduced in the v0.37.0 release:
- http3: fix check for content length of the response by
@imrocin quic-go/quic-go#3998- set a net.Conn with the correct addresses on the tls.ClientHelloInfo by
@marten-seemannin quic-go/quic-go#4001New Contributors
... (truncated)
Commits
21609dddon't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)d7aa627limit the number of queued PATH_RESPONSE frames to 256 (#4199)e2c360creassemble post-handshake TLS messages before passing them to crypto/tls (#4038)e9f7f46automatically set the tls.Config.ServerName if unset (#4032)12d84c4handshake: use the correct hash function for TLS_AES_256_GCM_SHA384 (#4031)b1635dfignore QUICConn.SendSessionTicket error if session tickets are disabled (#4030)4345a2dfix compatibility with API breaking change in Go 1.21 (#4020)b6a4725fix handling of ACK frames serialized after CRYPTO frames (#4018)4eedeb0add tls.ClientHelloInfo.Conn for recursive GetConfigForClient calls (#4016)38b703eadd error handling when confirming handshake on HANDSHAKE_DONE frames (#4017)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.