blob: 53b962d1a1f0f10214d9fc524cfd9d04b6e0158a [file] [log] [blame]
modules:
- module: std
versions:
- fixed: 1.4.3
packages:
- package: net/http
symbols:
- CanonicalMIMEHeaderKey
- body.readLocked
- canonicalMIMEHeaderKey
- chunkWriter.writeHeader
- fixLength
- fixTransferEncoding
- readTransfer
- transferWriter.shouldSendContentLength
- validHeaderFieldByte
description: |
HTTP headers were not properly parsed, which allows remote attackers to
conduct HTTP request smuggling attacks via a request that contains
Content-Length and Transfer-Encoding header fields.
published: 2022-01-05T21:39:14Z
cves:
- CVE-2015-5739
- CVE-2015-5740
- CVE-2015-5741
credit: Jed Denlea and RĂ©gis Leroy
references:
- fix: https://go.dev/cl/13148
- fix: https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f
- fix: https://go.dev/cl/11772
- fix: https://go.dev/cl/11810
- fix: https://go.dev/cl/12865
- fix: https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
- fix: https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f
- fix: https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87
- report: https://go.dev/issue/12027
- report: https://go.dev/issue/11930
- web: https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ