[ALAS2-2024-2598] Amazon Linux 2 2017.12 - ALAS2-2024-2598: medium priority package update for golang
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2024-24791:
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/golang?arch=x86_64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang?arch=aarch64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-tests?arch=noarch&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-src?arch=noarch&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-shared?arch=x86_64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-shared?arch=aarch64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-misc?arch=noarch&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-docs?arch=noarch&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-bin?arch=x86_64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
pkg:rpm/amazonlinux/golang-bin?arch=aarch64&distro=amazonlinux-2 | < 1.22.5-1.amzn2.0.1 |
- ID
- ALAS2-2024-2598
- Severity
- medium
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2598.html
- Published
-
2024-07-18T02:00:00
(2 months ago) - Modified
-
2024-07-18T02:00:00
(2 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2024-24791 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/golang?arch=x86_64&distro=amazonlinux-2 | amazonlinux | golang | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/golang?arch=aarch64&distro=amazonlinux-2 | amazonlinux | golang | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/golang-tests?arch=noarch&distro=amazonlinux-2 | amazonlinux | golang-tests | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | noarch | |
Affected | pkg:rpm/amazonlinux/golang-src?arch=noarch&distro=amazonlinux-2 | amazonlinux | golang-src | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | noarch | |
Affected | pkg:rpm/amazonlinux/golang-shared?arch=x86_64&distro=amazonlinux-2 | amazonlinux | golang-shared | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/golang-shared?arch=aarch64&distro=amazonlinux-2 | amazonlinux | golang-shared | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/golang-misc?arch=noarch&distro=amazonlinux-2 | amazonlinux | golang-misc | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | noarch | |
Affected | pkg:rpm/amazonlinux/golang-docs?arch=noarch&distro=amazonlinux-2 | amazonlinux | golang-docs | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | noarch | |
Affected | pkg:rpm/amazonlinux/golang-bin?arch=x86_64&distro=amazonlinux-2 | amazonlinux | golang-bin | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/golang-bin?arch=aarch64&distro=amazonlinux-2 | amazonlinux | golang-bin | < 1.22.5-1.amzn2.0.1 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |