Rocky Linux 8 : go-toolset:rhel8 (RLSA-2022:1819)

critical Nessus Plugin ID 184743

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2022:1819 advisory.

- Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used. (CVE-2021-38297)

- In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196. (CVE-2021-39293)

- ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.
(CVE-2021-41771)

- Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field. (CVE-2021-41772)

- Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption. (CVE-2022-23772)

- cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags. (CVE-2022-23773)

- Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element. (CVE-2022-23806)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2022:1819

https://bugzilla.redhat.com/show_bug.cgi?id=2006044

https://bugzilla.redhat.com/show_bug.cgi?id=2012887

https://bugzilla.redhat.com/show_bug.cgi?id=2014704

https://bugzilla.redhat.com/show_bug.cgi?id=2020725

https://bugzilla.redhat.com/show_bug.cgi?id=2020736

https://bugzilla.redhat.com/show_bug.cgi?id=2053429

https://bugzilla.redhat.com/show_bug.cgi?id=2053532

https://bugzilla.redhat.com/show_bug.cgi?id=2053541

Plugin Details

Severity: Critical

ID: 184743

File Name: rocky_linux_RLSA-2022-1819.nasl

Version: 1.1

Type: local

Published: 11/6/2023

Updated: 11/14/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-38297

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:delve, p-cpe:/a:rocky:linux:delve-debuginfo, p-cpe:/a:rocky:linux:delve-debugsource, p-cpe:/a:rocky:linux:go-toolset, p-cpe:/a:rocky:linux:golang, p-cpe:/a:rocky:linux:golang-bin, p-cpe:/a:rocky:linux:golang-docs, p-cpe:/a:rocky:linux:golang-misc, p-cpe:/a:rocky:linux:golang-race, p-cpe:/a:rocky:linux:golang-src, p-cpe:/a:rocky:linux:golang-tests, cpe:/o:rocky:linux:8

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/10/2022

Vulnerability Publication Date: 10/18/2021

Reference Information

CVE: CVE-2021-38297, CVE-2021-39293, CVE-2021-41771, CVE-2021-41772, CVE-2022-23772, CVE-2022-23773, CVE-2022-23806

IAVB: 2021-B-0069-S, 2022-B-0008-S