Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
|
|

Mageia alert MGASA-2024-0261 (golang)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2024-0261: Updated golang packages fix security vulnerability
Date:  Thu, 11 Jul 2024 03:04:58 +0200
Message-ID:  <20240711010458.37F57A0D5A@duvel.mageia.org>
Archive-link:  Article

MGASA-2024-0261 - Updated golang packages fix security vulnerability Publication date: 11 Jul 2024 URL: https://advisories.mageia.org/MGASA-2024-0261.html Type: security Affected Mageia releases: 9 CVE: CVE-2024-24791 Description: The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. (CVE-2024-24791) References: - https://bugs.mageia.org/show_bug.cgi?id=33380 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2... SRPMS: - 9/core/golang-1.21.12-1.mga9


to post comments


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds