Oval Definition:oval:org.opensuse.security:def:202329403
Revision Date:2023-06-22Version:1
Title:CVE-2023-29403
Description:

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
Family:unixClass:vulnerability
Status:Reference(s):Mitre CVE-2023-29403
SUSE CVE-2023-29403
SUSE-CU-2023:1963-1
SUSE-SU-2023:2525-1
SUSE-SU-2023:2526-1
Platform(s):SUSE Linux Enterprise Desktop 15 SP5
SUSE Linux Enterprise High Performance Computing 15 SP5
SUSE Linux Enterprise Module for Development Tools 15 SP5
SUSE Linux Enterprise Server 15 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP5
Product(s):
Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Desktop 15 SP5 is installed
  • OR SUSE Linux Enterprise High Performance Computing 15 SP5 is installed
  • OR SUSE Linux Enterprise Module for Development Tools 15 SP5 is installed
  • OR SUSE Linux Enterprise Server 15 SP5 is installed
  • OR SUSE Linux Enterprise Server for SAP Applications 15 SP5 is installed
  • AND Package Information
  • go1.19-1.19.10-150000.1.34.1 is installed
  • OR go1.19-doc-1.19.10-150000.1.34.1 is installed
  • OR go1.19-race-1.19.10-150000.1.34.1 is installed
  • OR go1.20-1.20.5-150000.1.14.1 is installed
  • OR go1.20-doc-1.20.5-150000.1.14.1 is installed
  • OR go1.20-race-1.20.5-150000.1.14.1 is installed
  • OR go is not affected
  • BACK