Skip to content

net/http: CVE-2023-45289 affected versions #66696

@ArnoSen

Description

@ArnoSen

Go version

n/a

Output of go env in your module/workspace:

n/a

What did you do?

I have been reading the report detailing CVE-2023-45289 at https://mattermost.com/blog/patching-gos-leaky-http-clients/.
This issue has been fixed already in 1.22.1 and 1.21.8
Reading the article, this vulnerability was introduced in https://go-review.googlesource.com/c/go/+/424935 which dates JAN 23 2023.

Prior to this CL, CVE-2023-45289 would not occur because IPv6 addresses would have had square brackets around them.

What did you see happen?

When reading the CVE details at https://www.cve.org/CVERecord?id=CVE-2023-45289, it says all versions up to 1.21.8 are affected.

What did you expect to see?

I would have expected to see that versions released that do not have CL424935 merged would not be affected.

Of course I can understand that earlier versions are supported anymore so maybe it is not relevant but I would like to understand the policy that is maintained for documenting CVE affected versions.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions