Print

Print


Synopsis:          Moderate: golang security, bug fix, and enhancement 
Advisory ID:       SLSA-2016:1538-1
Issue Date:        2016-08-03
CVE Numbers:       CVE-2016-5386
--

The following packages have been upgraded to a newer upstream version:
golang (1.6.3).

Security Fix(es):

* An input-validation flaw was discovered in the Go programming language
built in CGI implementation, which set the environment variable
"HTTP_PROXY" using the incoming "Proxy" HTTP-request header. The
environment variable "HTTP_PROXY" is used by numerous web clients,
including Go's net/http package, to specify a proxy server to use for HTTP
and, in some cases, HTTPS requests. This meant that when a CGI-based web
application ran, an attacker could specify a proxy server which the
application then used for subsequent outgoing requests, allowing a man-in-
the-middle attack. (CVE-2016-5386)
--

SL7
  x86_64
    golang-1.6.3-1.el7_2.1.x86_64.rpm
    golang-bin-1.6.3-1.el7_2.1.x86_64.rpm
  noarch
    golang-docs-1.6.3-1.el7_2.1.noarch.rpm
    golang-misc-1.6.3-1.el7_2.1.noarch.rpm
    golang-src-1.6.3-1.el7_2.1.noarch.rpm
    golang-tests-1.6.3-1.el7_2.1.noarch.rpm

- Scientific Linux Development Team