QID 353977
Date Published: 2022-07-18
QID 353977: Amazon Linux Security Advisory for golang : ALAS2-2022-1811
a validation flaw was found in golang.
When invoking functions from wasm modules built using goarch=wasm goos=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.
The highest threat from this vulnerability is to integrity. (
( CVE-2021-38297) a vulnerability was found in archive/zip of the go standard library.
Applications written in go can panic or potentially exhaust system memory when parsing malformed zip files.
An attacker capable of submitting a crafted zip file to a go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic.
This particular flaw is an incomplete fix for a previous flaw. (
( CVE-2021-39293) an out of bounds read vulnerability was found in debug/macho of the go standard library.
When using the debug/macho standard library (stdlib) and malformed binaries are parsed using open or openfat, it can cause golang to attempt to read outside of a slice (array) causing a panic when calling importedsymbols.
An attacker can use this vulnerability to craft a file which causes an application using this library to crash resulting in a denial of service. (
( CVE-2021-41771) a vulnerability was found in archive/zip of the go standard library.
Applications written in go where reader.
Open (the api implementing io/fs.
Fs introduced in go 1.16) can panic when parsing a crafted zip archive containing completely invalid names or an empty filename argument. (
( CVE-2021-41772) theres an uncontrolled resource consumption flaw in golangs net/http library in the canonicalheader() function.
( CVE-2021-44716) theres a flaw in golangs syscall.
Forkexec(). (
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2022-1811 -
alas.aws.amazon.com/AL2/ALAS-2022-1811.html
CVEs related to QID 353977
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2022-1811 | Amazon Linux 2 |
|