QID 356180

Date Published: 2023-09-28

QID 356180: Amazon Linux Security Advisory for golang : ALASGOLANG1.19-2023-001

the scalarmult and scalarbasemult methods of the p256 curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve).
This does not impact usages of crypto/ecdsa or crypto/ecdh. (
( CVE-2023-24532) http and mime header parsing could allocate large amounts of memory, even when parsing small inputs. certain unusual patterns of input data could cause the common function used to parse http and mime headers to allocate substantially more memory than required to hold the parsed headers.
An attacker can exploit this behavior to cause an http server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. (
( CVE-2023-24534) multipart form parsing can consume large amounts of cpu and memory when processing form inputs containing very large numbers of parts.
This stems from several causes: 1.
Mime/multipart.
Reader.
Readform limits the total memory a parsed multipart form can consume.
Readform can undercount the amount of memory consumed, leading it to accept larger inputs than intended.
2.
Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts.
3.
Readform can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector.
The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of cpu and memory, potentially resulting in a denial of service.
This affects programs that use mime/multipart.
In addition, the fixed mime/multipart.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALASGOLANG1.19-2023-001 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALASGOLANG1.19-2023-001 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASGOLANG1.19-2023-001.html