Количество 11
Количество 11

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on " ...

SUSE-SU-2023:4018-1
Security update for go1.20

SUSE-SU-2023:4017-1
Security update for go1.21
GHSA-679v-hh23-h5jh
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

BDU:2023-07201
Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2023:4472-1
Security update for go1.20-openssl

SUSE-SU-2023:4469-1
Security update for go1.21-openssl

ROS-20231109-01
Множественные уязвимости golang
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on " ... | CVSS3: 8.1 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4018-1 Security update for go1.20 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4017-1 Security update for go1.21 | 0% Низкий | почти 2 года назад | |
GHSA-679v-hh23-h5jh Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-07201 Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:4472-1 Security update for go1.20-openssl | больше 1 года назад | ||
![]() | SUSE-SU-2023:4469-1 Security update for go1.21-openssl | больше 1 года назад | ||
![]() | ROS-20231109-01 Множественные уязвимости golang | CVSS3: 9.8 | почти 2 года назад |
Уязвимостей на страницу