Skip to content

[26.1 backport] update to go1.21.12#48123

Merged
vvoland merged 1 commit intomoby:26.1from
vvoland:v26.1-48120
Jul 4, 2024
Merged

[26.1 backport] update to go1.21.12#48123
vvoland merged 1 commit intomoby:26.1from
vvoland:v26.1-48120

Conversation

@vvoland
Copy link
Copy Markdown
Contributor

@vvoland vvoland commented Jul 3, 2024

These minor releases include 1 security fixes following the security policy:

net/http: denial of service due to improper 100-continue handling

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

Thanks to Geoff Franks for reporting this issue.

This is CVE-2024-24791 and Go issue https://go.dev/issue/67555.
View the release notes for more information:
https://go.dev/doc/devel/release#go1.21.12

- Description for the changelog
Note: We don't use net/http/httputil.ReverseProxy so the server-side vulnerability doesn't apply.

This release updates the Go runtime to 1.21.11 which contains security fixes for [CVE-2024-24791](https://github.com/advisories/GHSA-hw49-2p59-3mhj)
Update Go runtime to 1.21.12

Signed-off-by: Paweł Gronowski [email protected]

- https://github.com/golang/go/issues?q=milestone%3AGo1.21.12+label%3ACherryPickApproved
- full diff: golang/go@go1.21.11...go1.21.12

These minor releases include 1 security fixes following the security policy:

net/http: denial of service due to improper 100-continue handling

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

Thanks to Geoff Franks for reporting this issue.

This is CVE-2024-24791 and Go issue https://go.dev/issue/67555.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.21.12

**- Description for the changelog**

```markdown changelog
Update Go runtime to 1.21.12
```

Signed-off-by: Paweł Gronowski <[email protected]>
(cherry picked from commit 4d1d7c3)
Signed-off-by: Paweł Gronowski <[email protected]>
@thaJeztah
Copy link
Copy Markdown
Member

I just noticed this backport only has a single commit, but is back porting 2 PR's; did you squash those commits, or did one drop?

@vvoland
Copy link
Copy Markdown
Contributor Author

vvoland commented Jul 4, 2024

Yeah I squashed these two commits into one proper commit.

@vvoland vvoland merged commit 6bc4906 into moby:26.1 Jul 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants