Lucene search

K
amazonAmazonALAS2-2023-1913
HistoryJan 18, 2023 - 12:17 a.m.

Important: golist

2023-01-1800:17:00
alas.aws.amazon.com
20
golist
reader.read
untrusted regexp parsing
memory exhaustion
cve-2022-2879
cve-2022-41715
amazon linux 2
update

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.8

Confidence

High

EPSS

0.002

Percentile

60.1%

Issue Overview:

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB. (CVE-2022-2879)

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. (CVE-2022-41715)

Affected Packages:

golist

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update golist to update your system.

New Packages:

aarch64:  
    golist-0.10.1-10.amzn2.0.2.aarch64  
    golist-debuginfo-0.10.1-10.amzn2.0.2.aarch64  
  
src:  
    golist-0.10.1-10.amzn2.0.2.src  
  
x86_64:  
    golist-0.10.1-10.amzn2.0.2.x86_64  
    golist-debuginfo-0.10.1-10.amzn2.0.2.x86_64  

Additional References

Red Hat: CVE-2022-2879, CVE-2022-41715

Mitre: CVE-2022-2879, CVE-2022-41715

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.8

Confidence

High

EPSS

0.002

Percentile

60.1%