Headline
CVE-2022-3959: Release v1.8.2 · drogonframework/drogon
A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. Affected by this issue is some unknown functionality of the component Session Hash Handler. The manipulation leads to small space of random values. The attack may be launched remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is c0d48da99f66aaada17bcd28b07741cac8697647. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213464.
API changes list
Add the queueInLoopCoro function.
Avoid HashDoS attacks via random per-session hash initial state.
Changed
Support the mediumint column when generate the mysql model.
Set Hiredis_FOUND to true when finding Hiredis library.
Add rate limiter.
Add some test cases for the sqlite datetime type.
Fixed
Fix typo in drogon_test.h.
Fix a date race in drogon_test.
Fix a deadlock bug when closing all database connections.