The Pion/SRTP project currently depends on golang.org/x/net version v0.27.0, which contains a known vulnerability in the html/doctype.go file, specifically in the parseDocType function. For html/foreign.go htmlIntegrationPoint() function, for html/parse.go inBodyIM() function, inTableIM function. These vulnerabilities can be exploited for a Denial of Service (DoS) attack.
Affected Dependency:
Package: golang.org/x/net
Current Version: v0.27.0
Vulnerable Function: parseDocType in html/doctype.go
Recommended Fix:
To mitigate this issue, please update golang.org/x/net to a non-vulnerable version:
v0.36.0
v0.37.0
v0.38.0
These versions contain fixes for the vulnerability.
The Pion/SRTP project currently depends on golang.org/x/net version v0.27.0, which contains a known vulnerability in the html/doctype.go file, specifically in the parseDocType function. For html/foreign.go htmlIntegrationPoint() function, for html/parse.go inBodyIM() function, inTableIM function. These vulnerabilities can be exploited for a Denial of Service (DoS) attack.
Affected Dependency:
Package: golang.org/x/net
Current Version: v0.27.0
Vulnerable Function: parseDocType in html/doctype.go
Recommended Fix:
To mitigate this issue, please update golang.org/x/net to a non-vulnerable version:
v0.36.0
v0.37.0
v0.38.0
These versions contain fixes for the vulnerability.