Sicherheit: Mangelnde Prüfung von Umgebungsvariablen in Go
||Mangelnde Prüfung von Umgebungsvariablen in Go
||Red Hat Enterprise Linux
||Mi, 3. August 2016, 08:40
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Moderate: golang security, bug fix, and enhancement update
Advisory ID: RHSA-2016:1538-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1538.html
Issue date: 2016-08-02
CVE Names: CVE-2016-5386
An update for golang is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server Optional (v. 7) - noarch, x86_64
The golang packages provide the Go programming language compiler.
The following packages have been upgraded to a newer upstream version:
golang (1.6.3). (BZ#1346331)
* An input-validation flaw was discovered in the Go programming language
built in CGI implementation, which set the environment variable
"HTTP_PROXY" using the incoming "Proxy" HTTP-request header.
environment variable "HTTP_PROXY" is used by numerous web clients,
including Go's net/http package, to specify a proxy server to use for HTTP
and, in some cases, HTTPS requests. This meant that when a CGI-based web
application ran, an attacker could specify a proxy server which the
application then used for subsequent outgoing requests, allowing a
man-in-the-middle attack. (CVE-2016-5386)
Red Hat would like to thank Scott Geary (VendHQ) for reporting this issue.
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
5. Bugs fixed (https://bugzilla.redhat.com/):
1346331 - REBASE to golang 1.6
1353798 - CVE-2016-5386 Go: sets environmental variable based on user supplied
Proxy request header
6. Package List:
Red Hat Enterprise Linux Server Optional (v. 7):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
Enterprise-watch-list mailing list