QID 355872

QID 355872: Amazon Linux Security Advisory for containerd : ALAS2023-2023-312

On unix platforms, the go runtime does not behave differently when a binary is run with the setuid/setgid bits.
This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors.
If a setuid/setgid binary is executed with standard i/o file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges.
Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers. (
( CVE-2023-29403) the http/1 client does not fully validate the contents of the host header.
A maliciously crafted host header can inject additional headers or entire requests.
With fix, the http/1 client now refuses to send requests containing an invalid request.
Host or request.
Url.host value. (
( CVE-2023-29406)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-312 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355872

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-312 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-312.html