Amazon Linux 1 Security Advisory: ALAS-2021-1527
Advisory Release Date: 2021-09-02 22:54 Pacific
Advisory Updated Date: 2021-09-08 19:13 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity. (CVE-2021-33197)
A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability. (CVE-2021-33198)
A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate's private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0-1.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected. (CVE-2021-34558)
Affected Packages:
golang
Issue Correction:
Run yum update golang to update your system.
i686:
golang-1.15.14-1.69.amzn1.i686
golang-bin-1.15.14-1.69.amzn1.i686
noarch:
golang-tests-1.15.14-1.69.amzn1.noarch
golang-misc-1.15.14-1.69.amzn1.noarch
golang-docs-1.15.14-1.69.amzn1.noarch
golang-src-1.15.14-1.69.amzn1.noarch
src:
golang-1.15.14-1.69.amzn1.src
x86_64:
golang-1.15.14-1.69.amzn1.x86_64
golang-race-1.15.14-1.69.amzn1.x86_64
golang-bin-1.15.14-1.69.amzn1.x86_64