[ALAS2-2020-1417] Amazon Linux 2 2017.12 - ALAS2-2020-1417: important priority package update for http-parser
Severity
Important
Affected Packages
9
CVEs
1
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2019-15605:
HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
1800364: CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/http-parser?arch=x86_64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser?arch=i686&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser?arch=aarch64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-devel?arch=x86_64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-devel?arch=i686&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-devel?arch=aarch64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-debuginfo?arch=i686&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
pkg:rpm/amazonlinux/http-parser-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 2.7.1-8.amzn2.2 |
- ID
- ALAS2-2020-1417
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2020-1417.html
- Published
-
2020-05-05T01:12:00
(4 years ago) - Modified
-
2020-05-06T22:56:00
(4 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2020-1359
- ALPINE:CVE-2019-15605
- ALSA-2020:0579
- ALSA-2020:0598
- DSA-4669-1
- ELSA-2020-0579
- ELSA-2020-0598
- ELSA-2020-0703
- ELSA-2020-0708
- FEDORA-2020-3838c8ea98
- FEDORA-2020-47efc31973
- FREEBSD:0032400F-624F-11EA-B495-000D3AB229D6
- GLSA-202003-48
- openSUSE-SU-2020:0293-1
- RHSA-2020:0579
- RHSA-2020:0598
- RHSA-2020:0703
- RHSA-2020:0708
- RLSA-2020:0579
- RLSA-2020:0598
- SUSE-SU-2020:0427-1
- SUSE-SU-2020:0429-1
- SUSE-SU-2020:0454-1
- SUSE-SU-2020:0455-1
- SUSE-SU-2020:0488-1
- USN-6380-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2019-15605 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/http-parser?arch=x86_64&distro=amazonlinux-2 | amazonlinux | http-parser | < 2.7.1-8.amzn2.2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/http-parser?arch=i686&distro=amazonlinux-2 | amazonlinux | http-parser | < 2.7.1-8.amzn2.2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/http-parser?arch=aarch64&distro=amazonlinux-2 | amazonlinux | http-parser | < 2.7.1-8.amzn2.2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/http-parser-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | http-parser-devel | < 2.7.1-8.amzn2.2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/http-parser-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | http-parser-devel | < 2.7.1-8.amzn2.2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/http-parser-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | http-parser-devel | < 2.7.1-8.amzn2.2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/http-parser-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | http-parser-debuginfo | < 2.7.1-8.amzn2.2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/http-parser-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | http-parser-debuginfo | < 2.7.1-8.amzn2.2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/http-parser-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | http-parser-debuginfo | < 2.7.1-8.amzn2.2 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |