github.com/golang/go is vulnerable to HTTP request smuggling. The vulnerability exists as invalid HTTP/1.1 headers were accepted and normalized with a space before the colon, allowing a reverse proxy to interpret the headers differently.
lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
access.redhat.com/errata/RHSA-2020:0101
access.redhat.com/errata/RHSA-2020:0329
access.redhat.com/errata/RHSA-2020:0652
github.com/golang/go/commit/41b1f88efab9d263408448bf139659119002ea50
github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8
github.com/golang/go/issues/34540
github.com/golang/go/issues/34541
github.com/golang/go/issues/34542
groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
lists.debian.org/debian-lts-announce/2021/03/msg00014.html
lists.debian.org/debian-lts-announce/2021/03/msg00015.html
lists.fedoraproject.org/archives/list/[email protected]/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
lists.fedoraproject.org/archives/list/[email protected]/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
lists.fedoraproject.org/archives/list/[email protected]/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
security.netapp.com/advisory/ntap-20191122-0004/