vulnerability

Amazon Linux AMI 2: CVE-2022-32148: Security patch for go-rpm-macros, golang, golang-github-godbus-dbus, golang-github-gorilla-context, golang-github-gorilla-mux, golang-github-kr-pty, golang-github-syndtr-gocapability, golang-googlecode-net, golang-googlecode-sqlite, golist, runc (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Aug 10, 2022
Added
Oct 11, 2022
Modified
Apr 30, 2025

Description

Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.

Solutions

amazon-linux-ami-2-upgrade-go-filesystemamazon-linux-ami-2-upgrade-go-rpm-macrosamazon-linux-ami-2-upgrade-go-rpm-templatesamazon-linux-ami-2-upgrade-go-srpm-macrosamazon-linux-ami-2-upgrade-golangamazon-linux-ami-2-upgrade-golang-binamazon-linux-ami-2-upgrade-golang-docsamazon-linux-ami-2-upgrade-golang-github-godbus-dbus-develamazon-linux-ami-2-upgrade-golang-github-gorilla-context-develamazon-linux-ami-2-upgrade-golang-github-gorilla-mux-develamazon-linux-ami-2-upgrade-golang-github-kr-pty-develamazon-linux-ami-2-upgrade-golang-github-syndtr-gocapability-develamazon-linux-ami-2-upgrade-golang-googlecode-net-develamazon-linux-ami-2-upgrade-golang-googlecode-sqlite-develamazon-linux-ami-2-upgrade-golang-miscamazon-linux-ami-2-upgrade-golang-raceamazon-linux-ami-2-upgrade-golang-sharedamazon-linux-ami-2-upgrade-golang-srcamazon-linux-ami-2-upgrade-golang-testsamazon-linux-ami-2-upgrade-golistamazon-linux-ami-2-upgrade-golist-debuginfoamazon-linux-ami-2-upgrade-runcamazon-linux-ami-2-upgrade-runc-debuginfo

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.