QID 355797

Date Published: 2023-08-14

QID 355797: Amazon Linux Security Advisory for containerd : ALAS2NITRO-ENCLAVES-2023-026

http2/hpack: avoid quadratic complexity in hpack decoding (cve-2022-41723) large handshake records may cause panics in crypto/tls.
Both clients and servers may send large tls handshake records which cause servers and clients, respectively, to panic when attempting to construct responses.
This affects all tls 1.3 clients, tls 1.2 clients which explicitly enable session resumption (by setting config.
Clientsessioncache to a non-nil value), and tls 1.3 servers which request client certificates (by setting config.
Clientauth >= requestclientcert). (
( CVE-2022-41724) golang: net/http, mime/multipart: denial of service from excessive resource consumption (https://groups.google.com/g/golang-announce/c/v0abfqafs_e) (cve-2022-41725) the scalarmult and scalarbasemult methods of the p256 curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve).
This does not impact usages of crypto/ecdsa or crypto/ecdh. (
( CVE-2023-24532) http and mime header parsing could allocate large amounts of memory, even when parsing small inputs. certain unusual patterns of input data could cause the common function used to parse http and mime headers to allocate substantially more memory than required to hold the parsed headers.
An attacker can exploit this behavior to cause an http server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. (
( CVE-2023-24534) multipart form parsing can consume large amounts of cpu and memory when processing form inputs containing very large numbers of parts.
This stems from several causes: 1.
Mime/multipart.
Reader.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2NITRO-ENCLAVES-2023-026 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2NITRO-ENCLAVES-2023-026 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASNITRO-ENCLAVES-2023-026.html