QID 352808
Date Published: 2021-09-13
QID 352808: Amazon Linux Security Advisory for golang: ALAS-2021-1527
A flaw was found in go, acting as an unintended proxy or intermediary, where reverseproxy forwards connection headers if the first one was empty.
This flaw allows an attacker to drop arbitrary headers.
The highest threat from this vulnerability is to integrity. (
( CVE-2021-33197) a flaw was found in go, where it attempts to allocate excessive memory.
This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents.
The highest threat from this vulnerability is to system availability. (
( CVE-2021-33198) a flaw was found in golang.
A panic can be triggered by an attacker in a privileged network position without access to the server certificate's private key, as long as a trusted ecdsa or ed25519 certificate for the server exists (or can be issued), or the client is configured with config.
Insecureskipverify.
Clients that disable all tls_rsa cipher suites (that is, tls 1.0-1.2 cipher suites without ecdhe), as well as tls 1.3-only clients, are unaffected. (
( CVE-2021-34558)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
- ALAS-2021-1527 -
alas.aws.amazon.com/ALAS-2021-1527.html
CVEs related to QID 352808
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2021-1527 | Amazon Linux |
|