SB2015091111 - Fedora 22 update for golang



SB2015091111 - Fedora 22 update for golang

Published: September 11, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015091111
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2015-5739)

The vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.

The vulnerability exists due to the "net/http" library in "net/textproto/reader.go" does not properly parse HTTP header keys. A remote attacker can send a specially crafted HTTP request and conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by "Content Length" instead of "Content-Length."



2) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2015-5740)

The vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.

The vulnerability exists due to the "net/http" library in "net/http/transfer.go" does not properly parse HTTP headers. A remote attacker can send a specially crafted HTTP request and conduct HTTP request smuggling attacks via a request with two Content-length headers.

3) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2015-5741)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.


Remediation

Install update from vendor's website.