Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN136

_____________________________________________________________________

DATE                : 14/03/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Go versions prior to 1.24.1,
                                           1.23.7.

=====================================================================
https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
_____________________________________________________________________

Hello gophers,

We have just released Go versions 1.24.1 and 1.23.7, minor point
releases.

These minor releases include 1 security fixes following the security
policy:

    net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using
IPv6 zone IDs

    Matching of hosts against proxy patterns could improperly treat
an IPv6 zone ID as a hostname component. For example, when the
NO_PROXY environment variable was set to "*.example.com", a request
to "[::1%25.example.com]:80` would incorrectly match and not be
proxied.

    Thanks to Juho Forsén of Mattermost for reporting this issue.

    This is CVE-2025-22870 and Go issue https://go.dev/issue/71984.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.24.1

You can download binary and source distributions from the Go website:
https://go.dev/dl/

To compile from source using a Git clone, update to the release with
git checkout go1.24.1 and build as usual.

Thanks to everyone who contributed to the releases.

Cheers,
Junyang and Michael for the Go team



=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
