CVE-2023-29403 — Resource Exposure in Standard Library Runtime
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateNov 14
Description
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or sig…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
Also affects: Fedora 38
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5Debian▶
CVE-2023-29403: golang-1.15 - On Unix platforms, the Go runtime does not behave differently when a binary is r...↗2023