
CVE-2023-29403 – Unsafe behavior in setuid/setgid binaries in runtime
https://notcve.org/view.php?id=CVE-2023-29403
08 Jun 2023 — On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may ... • https://go.dev/cl/501223 • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2023-29402 – Code injection via go command with cgo in cmd/go
https://notcve.org/view.php?id=CVE-2023-29402
08 Jun 2023 — The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected). • https://go.dev/cl/501226 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-24539 – Improper sanitization of CSS values in html/template
https://notcve.org/view.php?id=CVE-2023-24539
11 May 2023 — Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input. A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in the CSS co... • https://go.dev/cl/491615 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-176: Improper Handling of Unicode Encoding •

CVE-2023-24540 – Improper handling of JavaScript whitespace in html/template
https://notcve.org/view.php?id=CVE-2023-24540
11 May 2023 — Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in... • https://go.dev/cl/491616 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-176: Improper Handling of Unicode Encoding •

CVE-2023-29400 – Improper handling of empty HTML attributes in html/template
https://notcve.org/view.php?id=CVE-2023-29400
11 May 2023 — Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, "attr={{.}}") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. • https://go.dev/cl/491617 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-176: Improper Handling of Unicode Encoding •

CVE-2023-24537 – Infinite loop in parsing in go/scanner
https://notcve.org/view.php?id=CVE-2023-24537
06 Apr 2023 — Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. Red Hat Ansible Automation Platform provides an enterprise framework for building, deploy... • https://go.dev/cl/482078 • CWE-190: Integer Overflow or Wraparound CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2023-24538 – Backticks not treated as string delimiters in html/template
https://notcve.org/view.php?id=CVE-2023-24538
06 Apr 2023 — Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go... • https://github.com/skulkarni-mv/goIssue_dunfell • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-24534 – Excessive memory allocation in net/http and net/textproto
https://notcve.org/view.php?id=CVE-2023-24534
06 Apr 2023 — HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service... • https://go.dev/cl/481994 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-24536 – Excessive resource consumption in net/http, net/textproto and mime/multipart
https://notcve.org/view.php?id=CVE-2023-24536
06 Apr 2023 — Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with m... • https://go.dev/cl/482075 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-24532 – Incorrect calculation on P256 curves in crypto/internal/nistec
https://notcve.org/view.php?id=CVE-2023-24532
08 Mar 2023 — The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does no... • https://go.dev/cl/471255 • CWE-682: Incorrect Calculation •