-
Notifications
You must be signed in to change notification settings - Fork 18.3k
Description
Go version
n/a
Output of go env
in your module/workspace:
n/a
What did you do?
I have been reading the report detailing CVE-2023-45289 at https://mattermost.com/blog/patching-gos-leaky-http-clients/.
This issue has been fixed already in 1.22.1 and 1.21.8
Reading the article, this vulnerability was introduced in https://go-review.googlesource.com/c/go/+/424935 which dates JAN 23 2023.
Prior to this CL, CVE-2023-45289 would not occur because IPv6 addresses would have had square brackets around them.
What did you see happen?
When reading the CVE details at https://www.cve.org/CVERecord?id=CVE-2023-45289, it says all versions up to 1.21.8 are affected.
What did you expect to see?
I would have expected to see that versions released that do not have CL424935 merged would not be affected.
Of course I can understand that earlier versions are supported anymore so maybe it is not relevant but I would like to understand the policy that is maintained for documenting CVE affected versions.