Количество 11
Количество 11

BDU:2023-07201
Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код

ROS-20231109-01
Множественные уязвимости golang

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
CVE-2023-39323
Line directives ("//line") can be used to bypass the restrictions on " ...

SUSE-SU-2023:4018-1
Security update for go1.20

SUSE-SU-2023:4017-1
Security update for go1.21
GHSA-679v-hh23-h5jh
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

SUSE-SU-2023:4472-1
Security update for go1.20-openssl

SUSE-SU-2023:4469-1
Security update for go1.21-openssl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-07201 Уязвимость директивы "//line" языка программирования Go, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20231109-01 Множественные уязвимости golang | CVSS3: 9.8 | почти 2 года назад | |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
CVE-2023-39323 Line directives ("//line") can be used to bypass the restrictions on " ... | CVSS3: 8.1 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4018-1 Security update for go1.20 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4017-1 Security update for go1.21 | 0% Низкий | почти 2 года назад | |
GHSA-679v-hh23-h5jh Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4472-1 Security update for go1.20-openssl | больше 1 года назад | ||
![]() | SUSE-SU-2023:4469-1 Security update for go1.21-openssl | больше 1 года назад |
Уязвимостей на страницу