![]() |
|
Message-ID: <063b927b-4a6a-448d-9e8f-28b8c64a6539@oracle.com> Date: Fri, 4 Apr 2025 13:53:35 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: CVE-2025-22871 : Go net/http: request smuggling through invalid chunked data https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk/m/cs_6qIK5BAAJ announces the release of Go versions 1.24.2 and 1.23.8, including a security fix for: > net/http: request smuggling through invalid chunked data > > The net/http package accepted data in the chunked transfer encoding > containing an invalid chunk-size line terminated by a bare LF. > When used in conjunction with a server or proxy which incorrectly > interprets a bare LF in a chunk extension as part of the extension, > this could permit request smuggling. > > The net/http package now rejects chunk-size lines containing a bare LF. > > Thanks to Jeppe Bonde Weikop for reporting this issue. > > This is CVE-2025-22871 and Go issue https://go.dev/issue/71988. -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.