Ubuntu 23.04 Go vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | Ubuntu: Security Advisory (USN-6140-1) | 7 Jun 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2356) | 17 Jul 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2644) | 5 Sep 202300:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:2127-1) | 9 May 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2686) | 5 Sep 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2382) | 17 Jul 202300:00 | – | openvas |
OpenVAS | Gitea < 1.19.3 Multiple golang Vulnerabilities | 9 May 202300:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2023-0169) | 17 May 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2583) | 8 Aug 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for golang (EulerOS-SA-2023-2613) | 8 Aug 202300:00 | – | openvas |
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-6140-1. The text
# itself is copyright (C) Canonical, Inc. See
# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
##
include('compat.inc');
if (description)
{
script_id(176726);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/08");
script_cve_id(
"CVE-2022-41724",
"CVE-2022-41725",
"CVE-2023-24534",
"CVE-2023-24537",
"CVE-2023-24538",
"CVE-2023-24539",
"CVE-2023-24540",
"CVE-2023-29400"
);
script_xref(name:"USN", value:"6140-1");
script_xref(name:"IAVB", value:"2023-B-0080-S");
script_name(english:"Ubuntu 23.04 : Go vulnerabilities (USN-6140-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote Ubuntu host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Ubuntu 23.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the
USN-6140-1 advisory.
- Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS
handshake records which cause servers and clients, respectively, to panic when attempting to construct
responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption
(by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client
certificates (by setting Config.ClientAuth >= RequestClientCert). (CVE-2022-41724)
- A denial of service is possible from excessive resource consumption in net/http and mime/multipart.
Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory
and disk files. This also affects form parsing in the net/http package with the Request methods FormFile,
FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented
as storing up to maxMemory bytes +10MB (reserved for non-file parts) in memory. File parts which cannot
be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file
parts is excessively large and can potentially open a denial of service vector on its own. However,
ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead,
part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In
addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small
request body to create a large number of disk temporary files. With fix, ReadForm now properly accounts
for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory
bytes of memory consumption. Users should still be aware that this limit is high and may still be
hazardous. In addition, ReadForm now creates at most one on-disk temporary file, combining multiple form
parts into a single temporary file. The mime/multipart.File interface type's documentation states, If
stored on disk, the File's underlying concrete type will be an *os.File.. This is no longer the case when
a form contains more than one file part, due to this coalescing of parts into a single file. The previous
behavior of using distinct files for each form part may be reenabled with the environment variable
GODEBUG=multipartfiles=distinct. Users should be aware that multipart.ReadForm and the http.Request
methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the
size of form data with http.MaxBytesReader. (CVE-2022-41725)
- HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs,
potentially leading to a denial of service. Certain unusual patterns of input data can cause the common
function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold
the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large
amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service.
With fix, header parsing now correctly allocates only the memory required to hold parsed headers.
(CVE-2023-24534)
- Calling any of the Parse functions on Go source code which contains //line directives with very large line
numbers can cause an infinite loop due to integer overflow. (CVE-2023-24537)
- Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them
as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template
action within a Javascript template literal, the contents of the action can be used to terminate the
literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather
complex, and themselves can do string interpolation, the decision was made to simply disallow Go template
actions from being used inside of them (e.g. var a = {{.}}), since there is no obviously safe way to
allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse
returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is
currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous
behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will
now be escaped. This should be used with caution. (CVE-2023-24538)
- Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates
containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS
context and allowing for injection of unexpected HTML, if executed with untrusted input. (CVE-2023-24539)
- Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing
whitespace characters outside of the character set \t
\f\r\u0020\u2028\u2029 in JavaScript contexts
that also contain actions may not be properly sanitized during execution. (CVE-2023-24540)
- Templates containing actions in unquoted HTML attributes (e.g. attr={{.}}) executed with empty input can
result in output with unexpected results when parsed due to HTML normalization rules. This may allow
injection of arbitrary attributes into tags. (CVE-2023-29400)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://ubuntu.com/security/notices/USN-6140-1");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-24540");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/02/15");
script_set_attribute(attribute:"patch_publication_date", value:"2023/06/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/06/06");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:23.04");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.19");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.19-go");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.19-src");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.20");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.20-go");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:golang-1.20-src");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Ubuntu Local Security Checks");
script_copyright(english:"Ubuntu Security Notice (C) 2023 Canonical, Inc. / NASL script (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include('debian_package.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/Ubuntu/release');
if ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');
os_release = chomp(os_release);
if (! ('23.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 23.04', 'Ubuntu ' + os_release);
if ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);
var pkgs = [
{'osver': '23.04', 'pkgname': 'golang-1.19', 'pkgver': '1.19.8-1ubuntu0.1'},
{'osver': '23.04', 'pkgname': 'golang-1.19-go', 'pkgver': '1.19.8-1ubuntu0.1'},
{'osver': '23.04', 'pkgname': 'golang-1.19-src', 'pkgver': '1.19.8-1ubuntu0.1'},
{'osver': '23.04', 'pkgname': 'golang-1.20', 'pkgver': '1.20.3-1ubuntu0.1'},
{'osver': '23.04', 'pkgname': 'golang-1.20-go', 'pkgver': '1.20.3-1ubuntu0.1'},
{'osver': '23.04', 'pkgname': 'golang-1.20-src', 'pkgver': '1.20.3-1ubuntu0.1'}
];
var flag = 0;
foreach package_array ( pkgs ) {
var osver = NULL;
var pkgname = NULL;
var pkgver = NULL;
if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];
if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];
if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];
if (osver && pkgname && pkgver) {
if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
var tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'golang-1.19 / golang-1.19-go / golang-1.19-src / golang-1.20 / etc');
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo