[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1494 --- golang

ID: oval:org.secpod.oval:def:1700404Date: (C)2020-10-05   (M)2023-11-13
Class: PATCHFamily: unix




The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service. Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs

Platform:
Amazon Linux 2
Product:
golang
Reference:
ALAS2-2020-1494
CVE-2020-14040
CVE-2020-16845
CVE    2
CVE-2020-14040
CVE-2020-16845
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:golang:golang

© SecPod Technologies