[ALAS2-2024-2556] Amazon Linux 2 2017.12 - ALAS2-2024-2556: medium priority package update for golist
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2023-45288:
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
CVE-2023-39326:
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/golist?arch=x86_64&distro=amazonlinux-2 | < 0.10.1-10.amzn2.0.5 |
pkg:rpm/amazonlinux/golist?arch=aarch64&distro=amazonlinux-2 | < 0.10.1-10.amzn2.0.5 |
pkg:rpm/amazonlinux/golist-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 0.10.1-10.amzn2.0.5 |
pkg:rpm/amazonlinux/golist-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 0.10.1-10.amzn2.0.5 |
- ID
- ALAS2-2024-2556
- Severity
- medium
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2556.html
- Published
-
2024-05-23T22:04:00
(3 months ago) - Modified
-
2024-05-23T22:04:00
(3 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2024-1903
- ALAS-2024-1920
- ALAS2-2024-2388
- ALAS2-2024-2424
- ALAS2-2024-2446
- ALAS2-2024-2458
- ALAS2-2024-2543
- ALAS2-2024-2550
- ALAS2-2024-2554
- ALAS2-2024-2555
- ALAS2-2024-2568
- ALAS2-2024-2618
- ALPINE:CVE-2023-39326
- ALPINE:CVE-2023-45288
- ALSA-2024:0748
- ALSA-2024:0887
- ALSA-2024:1131
- ALSA-2024:1149
- ALSA-2024:1962
- ALSA-2024:1963
- ALSA-2024:2079
- ALSA-2024:2160
- ALSA-2024:2193
- ALSA-2024:2245
- ALSA-2024:2272
- ALSA-2024:2562
- ALSA-2024:2699
- ALSA-2024:2724
- ALSA-2024:3259
- ALSA-2024:3346
- ELSA-2024-0887
- ELSA-2024-1131
- ELSA-2024-1149
- ELSA-2024-12189
- ELSA-2024-12190
- ELSA-2024-12191
- ELSA-2024-12225
- ELSA-2024-12226
- ELSA-2024-12261
- ELSA-2024-12262
- ELSA-2024-12263
- ELSA-2024-12264
- ELSA-2024-1962
- ELSA-2024-1963
- ELSA-2024-2193
- ELSA-2024-2245
- ELSA-2024-2272
- ELSA-2024-2562
- ELSA-2024-2699
- ELSA-2024-2724
- ELSA-2024-2988
- ELSA-2024-3259
- ELSA-2024-3346
- FEDORA-2024-193547def8
- FEDORA-2024-ce2eefc399
- FREEBSD:C092BE0E-F7CC-11EE-AA6B-B42E991FC52E
- FREEBSD:CDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
- GLSA-202408-07
- GO-2023-2382
- GO-2024-2687
- RHSA-2024:0748
- RHSA-2024:0887
- RHSA-2024:1131
- RHSA-2024:1149
- RHSA-2024:1244
- RHSA-2024:1962
- RHSA-2024:1963
- RHSA-2024:2079
- RHSA-2024:2160
- RHSA-2024:2193
- RHSA-2024:2245
- RHSA-2024:2272
- RHSA-2024:2562
- RHSA-2024:2625
- RHSA-2024:2699
- RHSA-2024:2724
- RHSA-2024:2988
- RHSA-2024:3259
- RHSA-2024:3346
- RLSA-2024:2562
- RLSA-2024:2699
- RLSA-2024:2724
- RLSA-2024:3346
- SUSE-SU-2023:4708-1
- SUSE-SU-2023:4709-1
- SUSE-SU-2023:4930-1
- SUSE-SU-2023:4931-1
- SUSE-SU-2024:1121-1
- SUSE-SU-2024:1122-1
- SUSE-SU-2024:1160-1
- SUSE-SU-2024:1161-1
- SUSE-SU-2024:2108-1
- SUSE-SU-2024:3089-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- SUSE-SU-2024:3155-1
- SUSE-SU-2024:3188-1
- USN-6574-1
- USN-6886-1
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-39326 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39326 | |
CVE | CVE-2023-45288 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/golist?arch=x86_64&distro=amazonlinux-2 | amazonlinux | golist | < 0.10.1-10.amzn2.0.5 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/golist?arch=aarch64&distro=amazonlinux-2 | amazonlinux | golist | < 0.10.1-10.amzn2.0.5 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/golist-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | golist-debuginfo | < 0.10.1-10.amzn2.0.5 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/golist-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | golist-debuginfo | < 0.10.1-10.amzn2.0.5 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |