ALT-PU-2023-3411-1
Package golang updated to version 1.20.4-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2023-03470
Уязвимость языка программирования Go, связанная с ошибками при обработке специальных символов "<>" в контексте CSS, позволяющая нарушителю выполнить произвольный код
BDU:2023-03471
Уязвимость языка программирования Go, связанная с ошибками при обработке пробельных символов в контексте JavaScript, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-03472
Уязвимость языка программирования Go, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю внедрить произвольные атрибуты в теги HTML
Modified: 2025-01-24
CVE-2023-24539
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
- https://go.dev/cl/491615
- https://go.dev/cl/491615
- https://go.dev/issue/59720
- https://go.dev/issue/59720
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://pkg.go.dev/vuln/GO-2023-1751
- https://pkg.go.dev/vuln/GO-2023-1751
- https://security.netapp.com/advisory/ntap-20241129-0005/
Modified: 2025-01-24
CVE-2023-24540
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
- https://go.dev/cl/491616
- https://go.dev/cl/491616
- https://go.dev/issue/59721
- https://go.dev/issue/59721
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://pkg.go.dev/vuln/GO-2023-1752
- https://pkg.go.dev/vuln/GO-2023-1752
- https://security.netapp.com/advisory/ntap-20241115-0008/
Modified: 2025-01-24
CVE-2023-29400
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
- https://go.dev/cl/491617
- https://go.dev/cl/491617
- https://go.dev/issue/59722
- https://go.dev/issue/59722
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
- https://pkg.go.dev/vuln/GO-2023-1753
- https://pkg.go.dev/vuln/GO-2023-1753
- https://security.netapp.com/advisory/ntap-20241213-0005/