vulnerability
Amazon Linux AMI 2: CVE-2022-27191: Security patch for amazon-ssm-agent, go-rpm-macros, golang, golang-github-godbus-dbus, golang-github-gorilla-context, golang-github-gorilla-mux, golang-github-kr-pty, golang-github-syndtr-gocapability, golang-googlecode-net, golang-googlecode-sqlite, golist, runc (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Mar 18, 2022 | Oct 11, 2022 | Apr 30, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Mar 18, 2022
Added
Oct 11, 2022
Modified
Apr 30, 2025
Description
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
Solutions
amazon-linux-ami-2-upgrade-amazon-ssm-agentamazon-linux-ami-2-upgrade-amazon-ssm-agent-debuginfoamazon-linux-ami-2-upgrade-go-filesystemamazon-linux-ami-2-upgrade-go-rpm-macrosamazon-linux-ami-2-upgrade-go-rpm-templatesamazon-linux-ami-2-upgrade-go-srpm-macrosamazon-linux-ami-2-upgrade-golangamazon-linux-ami-2-upgrade-golang-binamazon-linux-ami-2-upgrade-golang-docsamazon-linux-ami-2-upgrade-golang-github-godbus-dbus-develamazon-linux-ami-2-upgrade-golang-github-gorilla-context-develamazon-linux-ami-2-upgrade-golang-github-gorilla-mux-develamazon-linux-ami-2-upgrade-golang-github-kr-pty-develamazon-linux-ami-2-upgrade-golang-github-syndtr-gocapability-develamazon-linux-ami-2-upgrade-golang-googlecode-net-develamazon-linux-ami-2-upgrade-golang-googlecode-sqlite-develamazon-linux-ami-2-upgrade-golang-miscamazon-linux-ami-2-upgrade-golang-raceamazon-linux-ami-2-upgrade-golang-sharedamazon-linux-ami-2-upgrade-golang-srcamazon-linux-ami-2-upgrade-golang-testsamazon-linux-ami-2-upgrade-golistamazon-linux-ami-2-upgrade-golist-debuginfoamazon-linux-ami-2-upgrade-runcamazon-linux-ami-2-upgrade-runc-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.