Advisory Published

USN-6140-1: Go vulnerabilities

First published: Tue Jun 06 2023(Updated: )

It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2022-41724, CVE-2023-24534, CVE-2023-24537) It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2022-41725) It was discovered that Go did not properly validate backticks (`) as Javascript string delimiters, and did not escape them as expected. An attacker could possibly use this issue to inject arbitrary Javascript code into the Go template. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2023-24538) It was discovered that Go did not properly validate the angle brackets in CSS values. An attacker could possibly use this issue to inject arbitrary CSS code. (CVE-2023-24539) It was discovered that Go did not properly validate whitespace characters in Javascript, and did not escape them as expected. An attacker could possibly use this issue to inject arbitrary Javascript code into the Go template. (CVE-2023-24540) It was discovered that Go did not properly validate HTML attributes with empty input. An attacker could possibly use this issue to inject arbitrary HTML tags into the Go template. (CVE-2023-29400)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/golang-1.19-go<1.19.8-1ubuntu0.1
1.19.8-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.19-src<1.19.8-1ubuntu0.1
1.19.8-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.20-go<1.20.3-1ubuntu0.1
1.20.3-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.20<1.20.3-1ubuntu0.1
1.20.3-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.19<1.19.8-1ubuntu0.1
1.19.8-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.20-src<1.20.3-1ubuntu0.1
1.20.3-1ubuntu0.1
Ubuntu=23.04
All of
ubuntu/golang-1.19-src<1.19.2-1ubuntu1.1
1.19.2-1ubuntu1.1
Ubuntu=22.10
All of
ubuntu/golang-1.19-go<1.19.2-1ubuntu1.1
1.19.2-1ubuntu1.1
Ubuntu=22.10
All of
ubuntu/golang-1.19<1.19.2-1ubuntu1.1
1.19.2-1ubuntu1.1
Ubuntu=22.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of USN-6140-1?

    The severity of USN-6140-1 is considered high as it can lead to a denial of service due to memory management issues.

  • How do I fix USN-6140-1?

    To fix USN-6140-1, update to the patched versions of golang-1.19-go, golang-1.19-src, golang-1.20-go, or golang-1.20 depending on your system.

  • Which versions are affected by USN-6140-1?

    USN-6140-1 affects golang-1.19 on Ubuntu 22.10 and versions of golang-1.20 on Ubuntu 23.04.

  • Can my system be exploited due to USN-6140-1?

    Yes, systems running affected versions of golang could potentially be exploited leading to service disruption.

  • What specific vulnerabilities are addressed in USN-6140-1?

    USN-6140-1 addresses vulnerabilities identified by CVE-2022-41724, CVE-2023-24534, and CVE-2023-24537.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203