QID 354488

Date Published: 2022-12-21

QID 354488: Amazon Linux Security Advisory for golang : ALAS2022-2022-009

A vulnerability was found in archive/zip of the go standard library.
Applications written in go can panic or potentially exhaust system memory when parsing malformed zip files. (
( CVE-2021-33196) there's an uncontrolled resource consumption flaw in golang's net/http library in the canonicalheader() function.
An attacker who submits specially crafted requests to applications linked with net/http's http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources. (
( CVE-2021-44716) there's a flaw in golang's syscall.
Forkexec() interface.
An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.
Forkexec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.
Forkexec(). (
( CVE-2021-44717)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-009 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354488

    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-009 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-009.html