Логотип exploitDog
bind:"CVE-2023-29402" OR bind:"CVE-2023-29404" OR bind:"CVE-2023-29405" OR bind:"CVE-2023-29403"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-29402" OR bind:"CVE-2023-29404" OR bind:"CVE-2023-29405" OR bind:"CVE-2023-29403"

Количество 34

Количество 34

ubuntu логотип

CVE-2023-29405

больше 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2023-29405

больше 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-29405

больше 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2023-29405

2 месяца назад

Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in cmd/go

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-29405

больше 2 лет назад

The go command may execute arbitrary code at build time when using cgo ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-29403

2 месяца назад

Unsafe behavior in setuid/setgid binaries in runtime

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-rxx3-4978-3cc9

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-68g3-2p3g-w9pq

больше 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-04160

больше 2 лет назад

Уязвимость расширения Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-03200

больше 2 лет назад

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-29405

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29405

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29405

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-29405

Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in cmd/go

CVSS3: 9.8
0%
Низкий
2 месяца назад
debian логотип
CVE-2023-29405

The go command may execute arbitrary code at build time when using cgo ...

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-29403

Unsafe behavior in setuid/setgid binaries in runtime

CVSS3: 7.8
0%
Низкий
2 месяца назад
debian логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-rxx3-4978-3cc9

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-68g3-2p3g-w9pq

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-04160

Уязвимость расширения Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03200

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу