Amazon Linux 2023 Security Advisory: ALAS2023-2026-1599
Advisory Released Date: 2026-04-30
Advisory Updated Date: 2026-04-30
FAQs regarding Amazon Linux ALAS/CVE Severity
Arithmetic over induction variables in loops were not correctly checked for underflow or overflow in the Go compiler (cmd/compile). As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption in programs compiled with affected Go versions. (CVE-2026-27143)
The Go compiler (cmd/compile) incorrectly handled no-op interface conversions, preventing correct determination about non-overlapping memory moves, potentially leading to memory corruption at runtime in programs compiled with affected Go versions. (CVE-2026-27144)
During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls. (CVE-2026-32280)
Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. (CVE-2026-32281)
On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. (CVE-2026-32282)
If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3. (CVE-2026-32283)
tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the old GNU sparse map format. (CVE-2026-32288)
Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content. This could cause actions within JS template literals to be incorrectly escaped, leading to XSS vulnerabilities. (CVE-2026-32289)
Affected Packages:
golist
Issue Correction:
Run dnf update golist --releasever 2023.11.20260427 or dnf update --advisory ALAS2023-2026-1599 --releasever 2023.11.20260427 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
golist-debuginfo-0.10.4-12.amzn2023.0.8.aarch64
golist-debugsource-0.10.4-12.amzn2023.0.8.aarch64
golist-0.10.4-12.amzn2023.0.8.aarch64
src:
golist-0.10.4-12.amzn2023.0.8.src
x86_64:
golist-0.10.4-12.amzn2023.0.8.x86_64
golist-debuginfo-0.10.4-12.amzn2023.0.8.x86_64
golist-debugsource-0.10.4-12.amzn2023.0.8.x86_64