Updated golang packages fix security vulnerabilities
Publication date: 02 Jun 2025Modification date: 02 Jun 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22870 , CVE-2025-22871
Description
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied - CVE-2025-22870. The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext - CVE-2025-22871.
References
- https://bugs.mageia.org/show_bug.cgi?id=34078
- https://www.openwall.com/lists/oss-security/2025/03/07/2
- https://www.openwall.com/lists/oss-security/2025/04/04/4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFNTP3P4URUREHKSWZQWIJPIXGRCFHUI/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871
SRPMS
9/core
- golang-1.23.8-1.mga9