Amazon Linux 2 Security Advisory: ALAS2-2019-1335
Advisory Released Date: 2019-10-21
Advisory Updated Date: 2025-04-08
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com. (CVE-2019-14809)
It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration. (CVE-2019-16276)
Affected Packages:
golang
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update golang to update your system.
aarch64:
golang-1.9.4-3.amzn2.0.3.aarch64
golang-bin-1.9.4-3.amzn2.0.3.aarch64
noarch:
golang-docs-1.9.4-3.amzn2.0.3.noarch
golang-misc-1.9.4-3.amzn2.0.3.noarch
golang-tests-1.9.4-3.amzn2.0.3.noarch
golang-src-1.9.4-3.amzn2.0.3.noarch
src:
golang-1.9.4-3.amzn2.0.3.src
x86_64:
golang-1.9.4-3.amzn2.0.3.x86_64
golang-bin-1.9.4-3.amzn2.0.3.x86_64
2025-04-08: CVE-2019-14809 was added to this advisory.