QID 355216
Date Published: 2023-05-29
QID 355216: Amazon Linux Security Advisory for golang : ALAS2023-2023-175
rat.
Setstring in math/big in go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to uncontrolled memory consumption. (
( CVE-2022-23772) cmd/go in go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags.
This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags. (
( CVE-2022-23773) a flaw was found in the elliptic package of the crypto library in golang when the isoncurve function could return true for invalid field elements.
This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource. (
( CVE-2022-23806) requests forwarded by reverseproxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http.
This could permit query parameter smuggling when a go proxy forwards a parameter with an unparseable value.
After fix, reverseproxy sanitizes the query parameters in the forwarded query when the outbound requests form field is set after the reverseproxy.
Director function returns, indicating that the proxy has parsed the query parameters.
Proxies which do not parse query parameters continue to forward the original query parameters unchanged. (
( CVE-2022-2880) code injection in cmd.
Start in os/exec before go 1.17.11 and go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling cmd.
Run, cmd.
Start, cmd.
Output, or cmd.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-175 -
alas.aws.amazon.com/AL2023/ALAS-2023-175.html
CVEs related to QID 355216
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-175 | amazon linux 2023 |
|