Updated golang packages fix security vulnerabilities
Publication date: 02 Jun 2025Modification date: 02 Jun 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22870 , CVE-2025-22871
Description
Matching of hosts against proxy patterns can improperly treat an IPv6
zone ID as a hostname component. For example, when the NO_PROXY
environment variable is set to "*.example.com", a request to
"[::1%25.example.com]:80` will incorrectly match and not be proxied -
CVE-2025-22870.
The net/http package improperly accepts a bare LF as a line terminator
in chunked data chunk-size lines. This can permit request smuggling if a
net/http server is used in conjunction with a server that incorrectly
accepts a bare LF as part of a chunk-ext - CVE-2025-22871.
References
- https://bugs.mageia.org/show_bug.cgi?id=34078
- https://www.openwall.com/lists/oss-security/2025/03/07/2
- https://www.openwall.com/lists/oss-security/2025/04/04/4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFNTP3P4URUREHKSWZQWIJPIXGRCFHUI/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871
SRPMS
9/core
- golang-1.23.8-1.mga9