[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2021-1527 --- golang

ID: oval:org.secpod.oval:def:1601472Date: (C)2021-09-13   (M)2023-11-10
Class: PATCHFamily: unix




A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity. A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability. A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate"s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists , or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites , as well as TLS 1.3-only clients, are unaffected

Platform:
Amazon Linux AMI
Product:
golang
Reference:
ALAS-2021-1527
CVE-2021-33197
CVE-2021-33198
CVE-2021-34558
CVE    3
CVE-2021-33197
CVE-2021-33198
CVE-2021-34558
CPE    2
cpe:/o:amazon:linux
cpe:/a:golang:golang

© SecPod Technologies