QID 355212
Date Published: 2023-05-29
QID 355212: Amazon Linux Security Advisory for golang : ALAS2023-2023-048
2023-05-11:( CVE-2022-1996 has changed status to not affected for this package and has been removed from this advisory. a vulnerability was found in archive/zip of the go standard library.
Applications written in go can panic or potentially exhaust system memory when parsing malformed zip files. (
( CVE-2021-33196) a validation flaw was found in golang.
When invoking functions from wasm modules built using goarch=wasm goos=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.
The highest threat from this vulnerability is to integrity. (
( CVE-2021-38297) an out of bounds read vulnerability was found in debug/macho of the go standard library.
When using the debug/macho standard library (stdlib) and malformed binaries are parsed using open or openfat, it can cause golang to attempt to read outside of a slice (array) causing a panic when calling importedsymbols.
An attacker can use this vulnerability to craft a file which causes an application using this library to crash resulting in a denial of service. (
( CVE-2021-41771) a vulnerability was found in archive/zip of the go standard library.
Applications written in go where reader.
Open (the api implementing io/fs.
Fs introduced in go 1.16) can panic when parsing a crafted zip archive containing completely invalid names or an empty filename argument. (
( CVE-2021-41772) theres an uncontrolled resource consumption flaw in golangs net/http library in the canonicalheader() function.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-048 -
alas.aws.amazon.com/AL2023/ALAS-2023-048.html
CVEs related to QID 355212
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-048 | amazon linux 2023 |
|