Amazon Linux 1 Security Advisory: ALAS-2015-588
Advisory Release Date: 2015-08-24 22:29 Pacific
Advisory Updated Date: 2015-08-24 22:42 Pacific
As discussed upstream -- http://seclists.org/oss-sec/2015/q3/294 and http://seclists.org/oss-sec/2015/q3/237 -- the Go project received notification of an HTTP request smuggling vulnerability in the net/http library. Invalid headers are parsed as valid headers (like "Content Length:" with a space in the middle) and Double Content-length headers in a request does not generate a 400 error, the second Content-length is ignored.
Affected Packages:
golang, docker
Issue Correction:
Run yum update golang docker to update your system.
i686:
golang-pkg-bin-linux-386-1.4.2-3.16.amzn1.i686
golang-1.4.2-3.16.amzn1.i686
noarch:
golang-pkg-plan9-386-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-windows-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-openbsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-windows-386-1.4.2-3.16.amzn1.noarch
golang-pkg-openbsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-darwin-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-darwin-386-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-386-1.4.2-3.16.amzn1.noarch
golang-src-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-plan9-amd64-1.4.2-3.16.amzn1.noarch
src:
golang-1.4.2-3.16.amzn1.src
docker-1.6.2-1.3.amzn1.src
x86_64:
golang-1.4.2-3.16.amzn1.x86_64
golang-pkg-bin-linux-amd64-1.4.2-3.16.amzn1.x86_64
docker-1.6.2-1.3.amzn1.x86_64
docker-devel-1.6.2-1.3.amzn1.x86_64
docker-pkg-devel-1.6.2-1.3.amzn1.x86_64