CVE-2023-29403
08.06.2023, 21:15
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.Enginsight
Vendor | Product | Version |
---|---|---|
golang | go | 𝑥 < 1.19.10 |
golang | go | 1.20.0 ≤ 𝑥 < 1.20.5 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
golang |
| ||||||||||||||||||||
golang-1.10 |
| ||||||||||||||||||||
golang-1.13 |
| ||||||||||||||||||||
golang-1.14 |
| ||||||||||||||||||||
golang-1.16 |
| ||||||||||||||||||||
golang-1.17 |
| ||||||||||||||||||||
golang-1.18 |
| ||||||||||||||||||||
golang-1.19 |
| ||||||||||||||||||||
golang-1.20 |
| ||||||||||||||||||||
golang-1.6 |
| ||||||||||||||||||||
golang-1.8 |
| ||||||||||||||||||||
golang-1.9 |
|
Common Weakness Enumeration
References