Логотип exploitDog
bind:"CVE-2023-29402" OR bind:"CVE-2023-29403" OR bind:"CVE-2023-29404" OR bind:"CVE-2023-29405"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-29402" OR bind:"CVE-2023-29403" OR bind:"CVE-2023-29404" OR bind:"CVE-2023-29405"

Количество 34

Количество 34

suse-cvrf логотип

SUSE-SU-2023:2526-1

больше 2 лет назад

Security update for go1.20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2525-1

больше 2 лет назад

Security update for go1.19

EPSS: Низкий
rocky логотип

RLSA-2023:3923

больше 2 лет назад

Critical: go-toolset and golang security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3923

больше 2 лет назад

ELSA-2023-3923: go-toolset and golang security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3922

больше 2 лет назад

ELSA-2023-3922: go-toolset:ol8 security update (CRITICAL)

EPSS: Низкий
redos логотип

ROS-20231109-01

почти 2 года назад

Множественные уязвимости golang

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2023-29402

больше 2 лет назад

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2023-29402

больше 2 лет назад

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2023-29402

больше 2 лет назад

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2023-29402

около 1 года назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-29402

больше 2 лет назад

The go command may generate unexpected code at build time when using c ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-f2cj-5636-4j38

больше 2 лет назад

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-03201

больше 2 лет назад

Уязвимость модуля Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.3
EPSS: Низкий
ubuntu логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-29403

2 месяца назад

Unsafe behavior in setuid/setgid binaries in runtime

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-29403

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-rxx3-4978-3cc9

больше 2 лет назад

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-03200

больше 2 лет назад

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:2526-1

Security update for go1.20

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2525-1

Security update for go1.19

больше 2 лет назад
rocky логотип
RLSA-2023:3923

Critical: go-toolset and golang security update

больше 2 лет назад
oracle-oval логотип
ELSA-2023-3923

ELSA-2023-3923: go-toolset and golang security update (CRITICAL)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-3922

ELSA-2023-3922: go-toolset:ol8 security update (CRITICAL)

больше 2 лет назад
redos логотип
ROS-20231109-01

Множественные уязвимости golang

CVSS3: 9.8
почти 2 года назад
ubuntu логотип
CVE-2023-29402

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29402

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29402

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 9.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2023-29402

The go command may generate unexpected code at build time when using c ...

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-f2cj-5636-4j38

The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03201

Уязвимость модуля Cgo языка программирования Go, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.3
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-29403

Unsafe behavior in setuid/setgid binaries in runtime

CVSS3: 7.8
0%
Низкий
2 месяца назад
debian логотип
CVE-2023-29403

On Unix platforms, the Go runtime does not behave differently when a b ...

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-rxx3-4978-3cc9

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03200

Уязвимость языка программирования Go, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю повысить свои привилегии и получить доступ на чтение, изменение или удаление данных

CVSS3: 5.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу