| Name | CVE-2022-1705 |
| Description | Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| golang-1.15 (PTS) | bullseye | 1.15.15-1~deb11u4 | vulnerable |
| golang-1.19 (PTS) | bookworm | 1.19.8-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| golang-1.11 | source | (unstable) | (not affected) | |||
| golang-1.15 | source | (unstable) | (unfixed) | |||
| golang-1.17 | source | (unstable) | 1.17.13-1 | |||
| golang-1.18 | source | (unstable) | 1.18.4-1 | |||
| golang-1.19 | source | (unstable) | 1.19~rc1-1 |
[bullseye] - golang-1.15 <no-dsa> (Minor issue)
- golang-1.11 <not-affected> (Introduced in 1.15)
https://go.dev/issue/53188
https://github.com/golang/go/commit/e5017a93fcde94f09836200bca55324af037ee5f (go1.19rc1)
https://github.com/golang/go/commit/222ee24a0046ae61679f4d97967e3b4058a3b90e (go1.18.4)
https://github.com/golang/go/commit/d13431c37ab62f9755f705731536ff74e7165b08 (go1.17.12)
Introduced by https://github.com/golang/go/commit/d5734d4f2dd1168dc3df94f2b9912299aea0c0ac (go1.15beta1)