QID 355872
QID 355872: Amazon Linux Security Advisory for containerd : ALAS2023-2023-312
On unix platforms, the go runtime does not behave differently when a binary is run with the setuid/setgid bits.
This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors.
If a setuid/setgid binary is executed with standard i/o file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges.
Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers. (
( CVE-2023-29403) the http/1 client does not fully validate the contents of the host header.
A maliciously crafted host header can inject additional headers or entire requests.
With fix, the http/1 client now refuses to send requests containing an invalid request.
Host or request.
Url.host value. (
( CVE-2023-29406)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-312 -
alas.aws.amazon.com/AL2023/ALAS-2023-312.html
CVEs related to QID 355872
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-312 | amazon linux 2023 |
|