Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 04 Aug 2015 22:56:12 +0000
From: Jason Buberel <>
To: Florian Weimer <>
	"" <>
Subject: Re: CVE Request - Go net/http library - HTTP smuggling


We believe that this is a potentially exploitable issue.  We would like a
CVE-ID in order to release a 1.4.3 build that has the fixes applied to the
current stable release (1.4.2) for linux distro coordination.

Commits have been made to the Go master branch to fix the problem:

Additional background on the exploit, as provided by the reporter:

net/http problems

* Double Content-length headers in a request does not generate a 400 error,
the second Content-length is ignored
* Invalid headers are parsed as valid headers (like "Content Length:" with a
space in the middle)


In a situation where the net/http agent HTTP communication with the final
http clients is using some reverse proxy (reverse proxy cache, SSL
terminators, etc), some requests can be made exploiting the net/http HTTP
protocol violations.

The goal of theses requests will be either:
 * to bypass security controls on theses previous elements
 * to perform some cache poisoning on these elements
 * to alter the request/response map on these previous elements (for DOS),
see for example this apache 2.4 issue:

On Wed, Jul 29, 2015 at 12:51 PM Jason Buberel <> wrote:

> Forian,
> We do have a alias, and a proposal for a more formal
> security review process <>, but
> I agree that the process isn't clear enough currently.
> In this particular case, the reporter sent a messages to
> That was then forwarded to me for handling.
> And I agree on the bundling. Is there another specific issue that you're
> tracking? Feel free to contact me directly -
> -jason
> On Wed, Jul 29, 2015 at 12:16 PM Florian Weimer <>
> wrote:
>> On 07/29/2015 05:15 PM, Jason Buberel wrote:
>> > Hello OSS Security Community,
>> >
>> > The Go open source project has received notification of an HTTP request
>> > smuggling vulnerability in the net/http library (
>> > The vulnerability was identified in
>> the
>> > 1.4.2 release version ( and in the 1.5 release
>> branch.
>> How does one report such things?
>> Due to lack of published security contact information, I contacted the
>> de-facto subsystem maintainer about the issue, but I have been ignored.
>> (It would be nice to be able to bundle such security updates as far as
>> possible, to avoid recompiling everything constantly.)
>> --
>> Florian Weimer / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.