Incorrect Privilege Assignment Affecting std/runtime package, versions <1.19.10>=1.20.0-0 <1.20.5


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Privilege Assignment vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-STDRUNTIME-14548560
  • published6 Jan 2026
  • disclosed8 Jun 2023
  • creditVincent Dehors

Introduced: 8 Jun 2023

CVE-2023-29403  (opens in a new tab)
CWE-266  (opens in a new tab)

How to fix?

Upgrade std/runtime to version 1.19.10, 1.20.5 or higher.

Overview

std/runtime is a Go standard library package std/runtime

Affected versions of this package are vulnerable to Incorrect Privilege Assignment.

Go Vulnerability Report:
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors.If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

CVSS Base Scores

version 4.0
version 3.1