Debian Golang-1.15 vulnerabilities
146 known vulnerabilities affecting debian/golang-1.15.
Total CVEs
146
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL12HIGH60MEDIUM43LOW31
Vulnerabilities
Page 4 of 8
CVE-2023-24531CRITICALCVSS 9.82023
CVE-2023-24531 [CRITICAL] CVE-2023-24531: golang-1.15 - Command go env is documented as outputting a shell script containing the Go envi...
Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set a
debian
CVE-2023-29402CRITICALCVSS 9.82023
CVE-2023-29402 [CRITICAL] CVE-2023-29402: golang-1.15 - The go command may generate unexpected code at build time when using cgo. This m...
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (mod
debian
CVE-2023-29404CRITICALCVSS 9.82023
CVE-2023-29404 [CRITICAL] CVE-2023-29404: golang-1.15 - The go command may execute arbitrary code at build time when using cgo. This may...
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly consid
debian
CVE-2023-24538CRITICALCVSS 9.8fixed in golang-1.19 1.19.8-2 (bookworm)2023
CVE-2023-24538 [CRITICAL] CVE-2023-24538: golang-1.15 - Templates do not properly consider backticks (`) as Javascript string delimiters...
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code in
debian
CVE-2023-24540CRITICALCVSS 9.82023
CVE-2023-24540 [CRITICAL] CVE-2023-24540: golang-1.15 - Not all valid JavaScript whitespace characters are considered to be whitespace. ...
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Scope: local
bullseye: open
debian
CVE-2023-29405CRITICALCVSS 9.82023
CVE-2023-29405 [CRITICAL] CVE-2023-29405: golang-1.15 - The go command may execute arbitrary code at build time when using cgo. This may...
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be
debian
CVE-2023-39323HIGHCVSS 8.12023
CVE-2023-39323 [HIGH] CVE-2023-39323: golang-1.15 - Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_"...
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting t
debian
CVE-2023-45287HIGHCVSS 7.52023
CVE-2023-45287 [HIGH] CVE-2023-45287: golang-1.15 - Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which...
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In
debian
CVE-2023-24537HIGHCVSS 7.5fixed in golang-1.19 1.19.8-2 (bookworm)2023
CVE-2023-24537 [HIGH] CVE-2023-24537: golang-1.15 - Calling any of the Parse functions on Go source code which contains //line direc...
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
Scope: local
bullseye: open
debian
CVE-2023-24534HIGHCVSS 7.5fixed in golang-1.19 1.19.8-2 (bookworm)2023
CVE-2023-24534 [HIGH] CVE-2023-24534: golang-1.15 - HTTP and MIME header parsing can allocate large amounts of memory, even when par...
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavio
debian
CVE-2023-24536HIGHCVSS 7.5fixed in golang-1.19 1.19.8-2 (bookworm)2023
CVE-2023-24536 [HIGH] CVE-2023-24536: golang-1.15 - Multipart form parsing can consume large amounts of CPU and memory when processi...
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intende
debian
CVE-2023-39325HIGHCVSS 7.52023
CVE-2023-39325 [HIGH] CVE-2023-39325: golang-1.15 - A malicious HTTP/2 client which rapidly creates requests and immediately resets ...
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix a
debian
CVE-2023-45288HIGHCVSS 7.5fixed in golang-golang-x-net 1:0.23.0+dfsg- (forky)2023
CVE-2023-45288 [HIGH] CVE-2023-45288: golang-1.15 - An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header dat...
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still
debian
CVE-2023-24539HIGHCVSS 7.32023
CVE-2023-24539 [HIGH] CVE-2023-24539: golang-1.15 - Angle brackets (<>) are not considered dangerous characters when inserted into C...
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
Scope: local
bullseye: open
debian
CVE-2023-29403HIGHCVSS 7.82023
CVE-2023-29403 [HIGH] CVE-2023-29403: golang-1.15 - On Unix platforms, the Go runtime does not behave differently when a binary is r...
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpec
debian
CVE-2023-45285HIGHCVSS 7.52023
CVE-2023-45285 [HIGH] CVE-2023-45285: golang-1.15 - Using go get to fetch a module with the ".git" suffix may unexpectedly fallback ...
Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
Scope:
debian
CVE-2023-29400HIGHCVSS 7.32023
CVE-2023-29400 [HIGH] CVE-2023-29400: golang-1.15 - Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") exe...
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
Scope: local
bullseye: open
debian
CVE-2023-29409MEDIUMCVSS 5.32023
CVE-2023-29409 [MEDIUM] CVE-2023-29409: golang-1.15 - Extremely large RSA keys in certificate chains can cause a client/server to expe...
Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all t
debian
CVE-2023-39318MEDIUMCVSS 6.12023
CVE-2023-39318 [MEDIUM] CVE-2023-39318: golang-1.15 - The html/template package does not properly handle HTML-like "" comment tokens, ...
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in contexts. This may cause the template parser to improperly interpret the contents of contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
Scope: local
bullseye: open
debian
CVE-2023-39326MEDIUMCVSS 5.32023
CVE-2023-39326 [MEDIUM] CVE-2023-39326: golang-1.15 - A malicious HTTP sender can use chunk extensions to cause a receiver reading fro...
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request.
debian