Name | CVE-2022-1705 |
Description | Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
golang-1.11 (PTS) | buster, buster (security) | 1.11.6-1+deb10u4 | fixed |
golang-1.15 (PTS) | bullseye | 1.15.15-1~deb11u4 | vulnerable |
golang-1.19 (PTS) | bookworm, sid | 1.19.6-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
golang-1.11 | source | (unstable) | (not affected) | |||
golang-1.15 | source | (unstable) | (unfixed) | |||
golang-1.17 | source | (unstable) | 1.17.13-1 | |||
golang-1.18 | source | (unstable) | 1.18.4-1 | |||
golang-1.19 | source | (unstable) | 1.19~rc1-1 |
- golang-1.11 <not-affected> (Introduced in 1.15)
https://go.dev/issue/53188
https://github.com/golang/go/commit/e5017a93fcde94f09836200bca55324af037ee5f (go1.19rc1)
https://github.com/golang/go/commit/222ee24a0046ae61679f4d97967e3b4058a3b90e (go1.18.4)
https://github.com/golang/go/commit/d13431c37ab62f9755f705731536ff74e7165b08 (go1.17.12)
Introduced by https://github.com/golang/go/commit/d5734d4f2dd1168dc3df94f2b9912299aea0c0ac (go1.15beta1)