PureHTTP2.jl follows Semantic Versioning. Security
fixes are applied to the latest released minor version on the main
branch. Older minor versions are not backported.
| Version | Supported |
|---|---|
| 0.3.x | ✅ |
| < 0.3 | ❌ |
If you believe you have found a security vulnerability in PureHTTP2.jl — for example, a crash triggered by a malicious peer, an HPACK decoder flaw, a flow-control accounting bug exploitable for denial of service, or any deviation from RFC 9113 or RFC 7541 with security impact — please do not open a public GitHub issue.
Instead, report it privately through GitHub's private vulnerability reporting workflow. This creates a draft advisory visible only to the maintainers.
Please include:
- A description of the vulnerability and its impact.
- A minimal reproduction (Julia version, PureHTTP2.jl version, environment, and a script or test case if possible).
- Any known mitigations or workarounds.
- Acknowledgement within 7 days of the report.
- Initial assessment within 14 days.
- Coordinated disclosure: a fix is prepared on a private branch, a
patch release is cut, and the GitHub advisory is published together
with the release notes in
CHANGELOG.md.
In scope:
- The
PureHTTP2module and its two package extensions (PureHTTP2OpenSSLExt,PureHTTP2ReseauExt). - Protocol conformance bugs in the frame layer, HPACK codec, stream state machine, connection lifecycle, and flow-control accounting.
Out of scope:
- Vulnerabilities in upstream dependencies (
OpenSSL.jl,Reseau.jl,libnghttp2). Please report those to their respective projects. Known upstream issues tracked by PureHTTP2.jl are listed inupstream-bugs.md. - Issues in the
test/interop/cross-test environment that do not affect the shipped library.