Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-29403

Опубликовано: 08 июн. 2023
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state or assuming the status of standard I/O file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 3golangAffected
Red Hat OpenShift GitOpsopenshift-gitops-1/argo-rollouts-rhel8Not affected
Red Hat Storage 3golangAffected
Red Hat Storage 3go-toolset-7-golangAffected
Red Hat Developer Toolsgo-toolset-1.19FixedRHSA-2023:392029.06.2023
Red Hat Developer Toolsgo-toolset-1.19-golangFixedRHSA-2023:392029.06.2023
Red Hat Enterprise Linux 8go-toolsetFixedRHSA-2023:392229.06.2023
Red Hat Enterprise Linux 9golangFixedRHSA-2023:392329.06.2023
Red Hat Enterprise Linux 9go-toolsetFixedRHSA-2023:392329.06.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-668
https://bugzilla.redhat.com/show_bug.cgi?id=2216965golang: runtime: unexpected behavior of setuid/setgid binaries

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
nvd
около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
debian
около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
github
около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 5.8
fstec
около 2 лет назад

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3