<?xml version="1.0" encoding="UTF-8"?>

<!-- AUTOGENERATED FILE. DO NOT EDIT. -->

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:cloud-load-balancing-security-bulletins</id>
  <title>Cloud Load Balancing - Security Bulletins</title>
  <link rel="self" href="https://cloud.google.com/feeds/cloud-load-balancing-security-bulletins.xml"/>
  <author>
    <name>Google Cloud</name>
  </author>
  <updated>2025-05-16T08:22:32.790118+00:00</updated>


  <entry>
    <title>GCP-2025-027</title>
    <id>tag:google.com,2016:cloud-load-balancing-security-bulletins#gcp-2025-027</id>
    <updated>2025-05-16T08:22:32.790118+00:00</updated>
    <link rel="alternate" href="https://cloud.google.com/load-balancing/docs/security-bulletins#gcp-2025-027"/>
    <content type="html"><![CDATA[<p><strong>Published: </strong>2025-05-16</p><h3 class="hide-from-toc" data-text="Description" id="description" tabindex="-1">Description</h3><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td><p>A security vulnerability was detected in the
       classic Application Load Balancer service prior to April 26, 2025.</p>
<h4 data-text="What should I do?" id="what-should-i-do" tabindex="-1">What should I do?</h4>
<p>No customer action is required. The issue was resolved in the
      Classic Application Load Balancer service on April 26, 2025.</p>
<h4 data-text="What vulnerabilities are being addressed?" id="what-vulnerabilities-are-being-addressed" tabindex="-1">What vulnerabilities are being addressed?</h4>
<p><a href="https://www.cve.org/CVERecord?id=CVE-2025-4600">CVE-2025-4600</a>
      allowed attackers to smuggle requests to classic Application Load Balancers due to
      incorrect parsing of oversized chunk bodies. When parsing the request
      body of an HTTP request using chunked transfer-encoding, the
      classic Application Load Balancer allows oversized chunk bodies. Consequently, it was
      feasible to hide bytes within this ignored trailing data that an upstream
      HTTP server might incorrectly interpret as a line terminator. This
      vulnerability was addressed within the classic Application Load Balancer service on
      April 26, 2025 through improved input validation and parsing logic.</p>
<h4 data-text="We're here to help" id="were-here-to-help" tabindex="-1">We're here to help</h4>
<p>If you have any questions or require assistance, contact
      <a href="https://cloud.google.com/support/docs/overview">Cloud Customer Care</a>.</p>
</td>
<td>High</td>
<td>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-4600">CVE-2025-4600</a>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>


</feed>
