Skip to content

fix: upgrade Go to 1.23.8 to resolve CVE-2025-22871#16

Open
chainloop-platform[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2025-22871-20260423-222820
Open

fix: upgrade Go to 1.23.8 to resolve CVE-2025-22871#16
chainloop-platform[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2025-22871-20260423-222820

Conversation

@chainloop-platform
Copy link
Copy Markdown

Summary

Upgraded Go version from 1.21 to 1.23.8 to patch a critical HTTP request smuggling vulnerability in the net/http package.

Vulnerability Fixed

CVE-2025-22871 (CRITICAL): The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines, which can permit HTTP request smuggling when the Go server is deployed behind a proxy that incorrectly accepts bare LF as part of a chunk-ext.

Changes Made

  • Updated go.mod to require Go 1.23.8, which includes the patched net/http package that properly rejects chunk-size lines containing bare LF characters
  • This fix eliminates the request smuggling attack vector that could enable cache poisoning, request routing manipulation, and authentication/authorization bypass when deployed behind a frontend proxy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants