CVE-2020-15586

Name
CVE-2020-15586
Description
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://www.cloudfoundry.org/blog/cve-2020-15586/
Third Party Advisory https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g
Third Party Advisory https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/
Third Party Advisory https://security.netapp.com/advisory/ntap-20200731-0005/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
Mailing List https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
Mailing List https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
Third Party Advisory https://www.debian.org/security/2021/dsa-4848
MISC https://www.oracle.com/security-alerts/cpuApr2021.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* go >= None < 1.13.13
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* go >= 1.14.0 < 1.14.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
go edge-community 1.14.5-r0 None fixed
go edge-community 1.13.7-r0 None possibly vulnerable
go edge-community 1.13.2-r0 None possibly vulnerable
go edge-community 1.13.1-r0 None possibly vulnerable
go edge-community 1.12.8-r0 None possibly vulnerable
go edge-community 1.11.5-r0 None possibly vulnerable
go edge-community 1.9.4-r0 None possibly vulnerable
go 3.22-community 1.14.5-r0 None fixed
go 3.22-community 1.13.7-r0 None possibly vulnerable
go 3.22-community 1.13.2-r0 None possibly vulnerable
go 3.22-community 1.13.1-r0 None possibly vulnerable
go 3.22-community 1.12.8-r0 None possibly vulnerable
go 3.22-community 1.11.5-r0 None possibly vulnerable
go 3.22-community 1.9.4-r0 None possibly vulnerable
go 3.21-community 1.14.5-r0 None fixed
go 3.20-community 1.14.5-r0 None fixed
go 3.19-community 1.14.5-r0 None fixed
go 3.18-community 1.14.5-r0 None fixed
go 3.17-community 1.14.5-r0 None fixed