On Unix, Go runtime doesn't behave differently when binary run with setuid/setgid bits. Can lead to unexpected content reading/writing with elevated privileges
Reporter | Title | Published | Views | Family All 138 |
---|---|---|---|---|
![]() | CVE-2023-29403 affecting package golang for versions less than 1.20.7-1 | 13 Nov 202409:13 | โ | cbl_mariner |
![]() | CVE-2023-29403 affecting package golang for versions less than 1.20.7-1 | 30 Aug 202315:15 | โ | cbl_mariner |
![]() | CVE-2023-29403 affecting package golang for versions less than 1.21.6-1 | 25 Feb 202403:00 | โ | cbl_mariner |
![]() | CVE-2023-29403 affecting package golang for versions less than 1.21.6-1 | 25 Feb 202403:00 | โ | cbl_mariner |
![]() | CVE-2023-29403 affecting package msft-golang for versions less than 1.20.7-1 | 5 Dec 202304:40 | โ | cbl_mariner |
![]() | CVE-2023-29403 affecting package golang for versions less than 1.20.7-1 | 19 Mar 202417:21 | โ | cbl_mariner |
![]() | Unsafe behavior in setuid/setgid binaries in runtime | 8 Jun 202320:16 | โ | osv |
![]() | BIT-golang-2023-29403 | 6 Mar 202410:55 | โ | osv |
![]() | CGA-QM28-54PP-3GJ6 | 6 Jun 202412:26 | โ | osv |
![]() | CVE-2023-29403 | 8 Jun 202321:15 | โ | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | go | 1.20.5-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | go | 1.20.5-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | go | 1.20.5-r0 | UNKNOWN |
Alpine | 3.20-community | noarch | go | 1.20.5-r0 | UNKNOWN |
Alpine | 3.21-community | noarch | go | 1.20.5-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo