Bugzilla – Bug 1227314
VUL-0: CVE-2024-24791 go1.21,go1.22: net/http: denial of service due to improper 100-continue handling
Last modified: 2024-07-05 12:30:06 UTC
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. Thanks to Geoff Franks for reporting this issue. This is CVE-2024-24791 and Go issue https://go.dev/issue/67555.
This is an autogenerated message for OBS integration: This bug (1227314) was mentioned in https://build.opensuse.org/request/show/1184953 Factory / go1.21 https://build.opensuse.org/request/show/1184954 Factory / go1.22
SUSE-SU-2024:2295-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1218424, 1227314 CVE References: CVE-2024-24791 Maintenance Incident: [SUSE:Maintenance:34556](https://smelt.suse.de/incident/34556/) Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): go1.22-1.22.5-1.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2294-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1212475, 1227314 CVE References: CVE-2024-24791 Maintenance Incident: [SUSE:Maintenance:34555](https://smelt.suse.de/incident/34555/) Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): go1.21-1.21.12-1.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2309-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1218424, 1227314 CVE References: CVE-2024-24791 Maintenance Incident: [SUSE:Maintenance:34558](https://smelt.suse.de/incident/34558/) Sources used: openSUSE Leap 15.6 (src): go1.22-1.22.5-150000.1.21.1 Development Tools Module 15-SP5 (src): go1.22-1.22.5-150000.1.21.1 Development Tools Module 15-SP6 (src): go1.22-1.22.5-150000.1.21.1 openSUSE Leap 15.5 (src): go1.22-1.22.5-150000.1.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2308-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1212475, 1227314 CVE References: CVE-2024-24791 Maintenance Incident: [SUSE:Maintenance:34557](https://smelt.suse.de/incident/34557/) Sources used: openSUSE Leap 15.5 (src): go1.21-1.21.12-150000.1.39.1 openSUSE Leap 15.6 (src): go1.21-1.21.12-150000.1.39.1 Development Tools Module 15-SP5 (src): go1.21-1.21.12-150000.1.39.1 Development Tools Module 15-SP6 (src): go1.21-1.21.12-150000.1.39.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): go1.21-1.21.12-150000.1.39.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): go1.21-1.21.12-150000.1.39.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): go1.21-1.21.12-150000.1.39.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): go1.21-1.21.12-150000.1.39.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): go1.21-1.21.12-150000.1.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.