Логотип exploitDog
bind:"CVE-2023-29402" OR bind:"CVE-2023-29405" OR bind:"CVE-2023-29403" OR bind:"CVE-2023-29404"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-29402" OR bind:"CVE-2023-29405" OR bind:"CVE-2023-29403" OR bind:"CVE-2023-29404"

Количество 32

Количество 32

redhat логотип

CVE-2023-29403

около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-29403

около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-29403

около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-29404

около 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2023-29404

около 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-29404

около 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2023-29404

около 2 лет назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-29404

около 2 лет назад

The go command may execute arbitrary code at build time when using cgo ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rxx3-4978-3cc9

около 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-03200

около 2 лет назад

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-888h-rm2r-vrc7

около 2 лет назад

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-04161

около 2 лет назад

Уязвимость расширения Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-29404

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-29404

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-29404

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 9.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-29404

The go command may execute arbitrary code at build time when using cgo ...

CVSS3: 9.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-rxx3-4978-3cc9

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-03200

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-888h-rm2r-vrc7

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-04161

Уязвимость расширения Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу