First published: Tue Jun 06 2023(Updated: )
It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2022-41724, CVE-2023-24534, CVE-2023-24537) It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2022-41725) It was discovered that Go did not properly validate backticks (`) as Javascript string delimiters, and did not escape them as expected. An attacker could possibly use this issue to inject arbitrary Javascript code into the Go template. This issue only affected golang-1.19 on Ubuntu 22.10. (CVE-2023-24538) It was discovered that Go did not properly validate the angle brackets in CSS values. An attacker could possibly use this issue to inject arbitrary CSS code. (CVE-2023-24539) It was discovered that Go did not properly validate whitespace characters in Javascript, and did not escape them as expected. An attacker could possibly use this issue to inject arbitrary Javascript code into the Go template. (CVE-2023-24540) It was discovered that Go did not properly validate HTML attributes with empty input. An attacker could possibly use this issue to inject arbitrary HTML tags into the Go template. (CVE-2023-29400)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/golang-1.19-go | <1.19.8-1ubuntu0.1 | 1.19.8-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.19-src | <1.19.8-1ubuntu0.1 | 1.19.8-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.20-go | <1.20.3-1ubuntu0.1 | 1.20.3-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.20 | <1.20.3-1ubuntu0.1 | 1.20.3-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.19 | <1.19.8-1ubuntu0.1 | 1.19.8-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.20-src | <1.20.3-1ubuntu0.1 | 1.20.3-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/golang-1.19-src | <1.19.2-1ubuntu1.1 | 1.19.2-1ubuntu1.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/golang-1.19-go | <1.19.2-1ubuntu1.1 | 1.19.2-1ubuntu1.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/golang-1.19 | <1.19.2-1ubuntu1.1 | 1.19.2-1ubuntu1.1 |
Ubuntu | =22.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6140-1 is considered high as it can lead to a denial of service due to memory management issues.
To fix USN-6140-1, update to the patched versions of golang-1.19-go, golang-1.19-src, golang-1.20-go, or golang-1.20 depending on your system.
USN-6140-1 affects golang-1.19 on Ubuntu 22.10 and versions of golang-1.20 on Ubuntu 23.04.
Yes, systems running affected versions of golang could potentially be exploited leading to service disruption.
USN-6140-1 addresses vulnerabilities identified by CVE-2022-41724, CVE-2023-24534, and CVE-2023-24537.