What is the expected behavior?
Either validate Tyk is not affected and inform users of that or upgrade packages / go version us suggested by Google in their advisory.
Which versions of Tyk affected by this issue? Did this work in previous versions of Tyk?
Possible affects most of the latest releases, if not all of them.
Sorry for the delay in communication. The latest version of the gateway is v5.3.1 and is built with go 1.21.8. That falls underneath the versions susceptible to the vulnerability.
When I check our docker image based on the CVE-2023-45288, I can see two packages with the issues:
Considering the attack area is HTTP/2, the vulnerability may not be exploitable since proxy_enable_http2 is disabled by default but we haven’t tested this to confirm.
The next release of the gateway should be on Go 1.22.2 (or later) and account for the fix