跳转到帖子

Amazon Linux 2023: CVE-2023-49569: Important priority package update for amazon-ssm-agent

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-49569: Important priority package update for amazon-ssm-agent

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
01/09/2024
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved. Applications are only affected if they are using theChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications usingBoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue. This is a go-git implementation issue and does not affect the upstream git cli. A path traversal vulnerability was discovered in the go library go-git. This issue may allow an attacker to create and amend files across the filesystem when applications are using the default ChrootOS, potentially allowing remote code execution.

Solution(s)

  • amazon-linux-2023-upgrade-amazon-ssm-agent
  • amazon-linux-2023-upgrade-amazon-ssm-agent-debuginfo
  • amazon-linux-2023-upgrade-amazon-ssm-agent-debugsource

References

  • https://attackerkb.com/topics/cve-2023-49569
  • CVE - 2023-49569
  • https://alas.aws.amazon.com/AL2023/ALAS-2024-526.html
  • 查看数 710
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…