Ava-700 Golang vulnerabilities could cause Ava Aware to restart
Release Date
11 November 2022.
Overview
Due to vulnerabilities in the Go `archive/tar` and `regexp/syntax` packages, an attacker could cause Ava Aware to restart.
Affected Products
- Ava Aware:
- All Stable upgrade channel versions before 5.3.4.
- All Beta upgrade channel versions before 5.3.4.
Unaffected Products
- Ava Aware:
- All Stable upgrade channel versions after and including 5.3.4
- All Beta upgrade channel versions after and including 5.3.4.
- Ava cameras: all versions.
- Ava Cloud: all versions.
Resolution
This issue has been fixed in Ava Aware Beta upgrade channel version 5.3.4 and Stable upgrade channel version 5.3.4.
It is strongly recommended that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface.
Vulnerability Information
- CVE: CVE-2022-41715 and CVE-2022-2879
- CVSSv3 score: 4.9 (medium)
- CVSSv3 vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Mitigations
There are no known mitigations for this issue.
Work arounds
There are no known work arounds for this issue.
Acknowledgements
Issue found, and reported to The Go Team by Adam Korczynski (ADA Logics) and OSS-Fuzz.
Disclosure Timeline
- 04/10/2022 Issue found (by Adam Korczynski (ADA Logics) and OSS-Fuzz.)
- 05/10/2022 Root cause established
- 05/10/2022 Fix identified
- 06/10/2022 Patched Ava Aware (Beta upgrade channel) released
- 06/10/2022 Patched Ava Aware (Stable upgrade channel) released
- 11/11/2022 Vulnerability publicly disclosed