Skip to main content
Version: latest

CVE-2023-29403

CVE Details

Visit the official vulnerability details page for CVE-2023-29403 to learn more.

Initial Publication

10/25/2024

Last Update

12/21/2024

Third Party Dependency

go

NIST CVE Summary

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVE Severity

7.8

Our Official Summary

This security flaw occurs if an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. This issue results in a denial of service when the affected process hangs.

This vulnerability is very platform specific and is reported on Windows OS only. Hence the impact of this CVE on our products is low. The 3rd party kubevirt images in which this vulnerability is reported has no fixed versions available yet.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.5.11⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.5.10⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.5.8⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.5.5⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.5.4⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact
4.4.20⚠️ Impacted⚠️ Impacted⚠️ Impacted✅ No Impact

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11, 4.5.15
12/05/2024Official summary revised: This security flaw occurs if an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. This issue results in a denial of service when the affected process hangs. This vulnerability is very platform specific and is reported on Windows OS only. Hence the impact of this CVE on our products is low. The 3rd party kubevirt images in which this vulnerability is reported has no fixed versions available yet.
12/05/2024Official summary revised: This vulnerability is reported on Go runtime in several older versions. Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object.The 3rd party images in which this vulnerability is reported will be upgrade as and when fixes are available. Risk of exploitation is low as the containers do not allow execution of arbitray code and remote code exploitation is not possible. Impact of exploitation is also low as container restricts the attack surface.
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10
11/13/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8 to 4.5.4, 4.5.5, 4.5.8, 4.4.20
11/10/2024Impacted versions changed from 4.5.4, 4.5.5 to 4.5.4, 4.5.5, 4.5.8
10/27/2024Impacted versions changed from 4.5.4 to 4.5.4, 4.5.5