storjnet-info
storjnet-info copied to clipboard
Bump github.com/quic-go/quic-go from 0.32.0 to 0.37.7
Bumps github.com/quic-go/quic-go from 0.32.0 to 0.37.7.
Release notes
Sourced from github.com/quic-go/quic-go's releases.
v0.37.7
This release contains fixes for the Honeybadger vulnerability (CVE-2023-49295):
- limit the number of queued PATH_RESPONSE frames to 256 (#4199)
- don't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.6...v0.37.7
v0.37.6
This patch release contains a backport of quic-go/quic-go#4038.
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.5...v0.37.6
v0.37.5
This patch release contains the backport of 3 fixes:
- fix handshake failure if
tls.Config.SessionTicketDisabled = false
, buttls.Config.GetConfigForClient
returns a config that disables session tickets: #4030- use the correct hash function for TLS_AES_256_GCM_SHA384: #4031
- automatically set the
tls.Config.ServerName
: #4032Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.4...v0.37.5
v0.37.4
This release contains a fix for a last-minute breaking API change in Go 1.21: quic-go/quic-go#4020
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.3...v0.37.4
v0.37.3
This patch release
- fixes handling of ACK frames serialized after CRYPTO frames: #4018
- sets a
net.Conn
on thetls.ClientHelloInfo
used onGetCertificate
andGetConfigForClient
, fortls.Config
s returned (recursively) fromGetConfigForClient
: quic-go/quic-go#4016Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.2...v0.37.3
v0.37.2
This patch release
- contains a backport of the fix that triggered the Go 1.20.7 / 1.19.12 patch release (https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017): quic-go/quic-go#4012
- sets a
net.Conn
with the correct addresses on thetls.ClientHelloInfo
used intls.Config.GetCertificate
: quic-go/quic-go#4015Note that in order to be protected against the DoS attack making use of large RSA keys, it's necessary to update to this patch release (for Go 1.20). For Go 1.21, please update the Go compiler.
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.1...v0.37.2
v0.37.1
This is a patch release fixing two regressions introduced in the v0.37.0 release:
- http3: fix check for content length of the response by
@imroc
in quic-go/quic-go#3998- set a net.Conn with the correct addresses on the tls.ClientHelloInfo by
@marten-seemann
in quic-go/quic-go#4001New Contributors
... (truncated)
Commits
21609dd
don't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)d7aa627
limit the number of queued PATH_RESPONSE frames to 256 (#4199)e2c360c
reassemble post-handshake TLS messages before passing them to crypto/tls (#4038)e9f7f46
automatically set the tls.Config.ServerName if unset (#4032)12d84c4
handshake: use the correct hash function for TLS_AES_256_GCM_SHA384 (#4031)b1635df
ignore QUICConn.SendSessionTicket error if session tickets are disabled (#4030)4345a2d
fix compatibility with API breaking change in Go 1.21 (#4020)b6a4725
fix handling of ACK frames serialized after CRYPTO frames (#4018)4eedeb0
add tls.ClientHelloInfo.Conn for recursive GetConfigForClient calls (#4016)38b703e
add error handling when confirming handshake on HANDSHAKE_DONE frames (#4017)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.