ALAS2023-2026-1671


Amazon Linux 2023 Security Advisory: ALAS2023-2026-1671
Advisory Released Date: 2026-05-14
Advisory Updated Date: 2026-05-14
Severity: Medium

Issue Overview:

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process. (CVE-2025-47913)

Arithmetic over induction variables in loops were not correctly checked for underflow or overflow in the Go compiler (cmd/compile). As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption in programs compiled with affected Go versions. (CVE-2026-27143)

The Go compiler (cmd/compile) incorrectly handled no-op interface conversions, preventing correct determination about non-overlapping memory moves, potentially leading to memory corruption at runtime in programs compiled with affected Go versions. (CVE-2026-27144)

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls. (CVE-2026-32280)

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. (CVE-2026-32281)

On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. (CVE-2026-32282)

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3. (CVE-2026-32283)

tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the old GNU sparse map format. (CVE-2026-32288)

Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content. This could cause actions within JS template literals to be incorrectly escaped, leading to XSS vulnerabilities. (CVE-2026-32289)

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, insufficient validation of Git URL fragment subdir components may allow access to files outside the checked-out Git repository root. Possible access is limited to files on the same mounted filesystem. The issue has been fixed in version v0.28.1 The issue affects only builds that use Git URLs with a subpath component. As a workaround, avoid building Dockerfiles from untrusted sources or using the subdir component from an untrusted Git repository where the subdir component could point to a symlink. (CVE-2026-33748)


Affected Packages:

runfinch-finch


Issue Correction:
Run dnf update runfinch-finch --releasever 2023.11.20260511 or dnf update --advisory ALAS2023-2026-1671 --releasever 2023.11.20260511 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    runfinch-finch-1.17.0-1.amzn2023.0.1.aarch64

src:
    runfinch-finch-1.17.0-1.amzn2023.0.1.src

x86_64:
    runfinch-finch-1.17.0-1.amzn2023.0.1.x86_64