The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
{
"binaries": [
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "gcc-4.9-base"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "gccgo-4.9"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "gccgo-4.9-multilib"
},
{
"binary_version": "1:4.9.3-0ubuntu4",
"binary_name": "lib32gcc1"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "lib32go5"
},
{
"binary_version": "1:4.9.3-0ubuntu4",
"binary_name": "lib64gcc1"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "lib64go5"
},
{
"binary_version": "1:4.9.3-0ubuntu4",
"binary_name": "libgcc1"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "libgo5"
},
{
"binary_version": "1:4.9.3-0ubuntu4",
"binary_name": "libsfgcc1"
},
{
"binary_version": "1:4.9.3-0ubuntu4",
"binary_name": "libx32gcc1"
},
{
"binary_version": "4.9.3-0ubuntu4",
"binary_name": "libx32go5"
}
]
}