Количество 11
Количество 11

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on " ...

SUSE-SU-2023:4018-1
Security update for go1.20

SUSE-SU-2023:4017-1
Security update for go1.21
GHSA-679v-hh23-h5jh
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

BDU:2023-07201
Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2023:4472-1
Security update for go1.20-openssl

SUSE-SU-2023:4469-1
Security update for go1.21-openssl

ROS-20231109-01
Множественные уязвимости golang
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | больше 1 года назад |
CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on " ... | CVSS3: 8.1 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4018-1 Security update for go1.20 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4017-1 Security update for go1.21 | 0% Низкий | больше 1 года назад | |
GHSA-679v-hh23-h5jh Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 9.8 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2023-07201 Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:4472-1 Security update for go1.20-openssl | больше 1 года назад | ||
![]() | SUSE-SU-2023:4469-1 Security update for go1.21-openssl | больше 1 года назад | ||
![]() | ROS-20231109-01 Множественные уязвимости golang | CVSS3: 9.8 | больше 1 года назад |
Уязвимостей на страницу