| - module: github.com/aws/aws-sdk-go |
| - package: github.com/aws/aws-sdk-go/service/s3/s3crypto |
| The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker |
| with write access to a bucket to decrypt files in that bucket. |
| Files encrypted by the V1 EncryptionClient using either the AES-CBC |
| content cipher or the KMS key wrap algorithm are vulnerable. Users should |
| migrate to the V1 EncryptionClientV2 API, which will not create vulnerable |
| files. Old files will remain vulnerable until reencrypted with the new |
| published: 2022-02-11T23:26:26Z |
| credit: Sophie Schmieg from the Google ISE team |
| - advisory: https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09 |
| - fix: https://github.com/aws/aws-sdk-go/pull/3403 |
| - fix: https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4 |