ALAS2023-2023-394


Amazon Linux 2023 Security Advisory: ALAS-2023-394
Advisory Release Date: 2023-10-16 13:45 Pacific
Advisory Updated Date: 2023-10-18 20:10 Pacific
Severity: Important

Issue Overview:

Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. (CVE-2023-39323)

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. (CVE-2023-39325)

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. (CVE-2023-44487)


Affected Packages:

golang


Issue Correction:
Run dnf update golang --releasever 2023.2.20231016 to update your system.

New Packages:
aarch64:
    golang-bin-1.20.10-1.amzn2023.0.1.aarch64
    golang-shared-1.20.10-1.amzn2023.0.1.aarch64
    golang-1.20.10-1.amzn2023.0.1.aarch64

noarch:
    golang-docs-1.20.10-1.amzn2023.0.1.noarch
    golang-misc-1.20.10-1.amzn2023.0.1.noarch
    golang-src-1.20.10-1.amzn2023.0.1.noarch
    golang-tests-1.20.10-1.amzn2023.0.1.noarch

src:
    golang-1.20.10-1.amzn2023.0.1.src

x86_64:
    golang-bin-1.20.10-1.amzn2023.0.1.x86_64
    golang-shared-1.20.10-1.amzn2023.0.1.x86_64
    golang-1.20.10-1.amzn2023.0.1.x86_64