• CVE-2023-29403

发布时间: 2023年7月8日

修改时间: 2024年10月31日

概要

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Local Local
CVSS评分 7.8 7.8
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity High High
User Interaction Required Required
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-2028 golang security update 2023年7月8日

影响产品

产品 状态
KY3.4-4A golang Fixed
KY3.4-5A golang Fixed
KY3.5.1 golang Fixed
KY3.5.2 golang Fixed