Vulnerability Report: GO-2023-1671
- CVE-2023-28436, GHSA-vfgq-g5x8-g595
- Affects: tailscale.com
- Published: Aug 20, 2024
- Unreviewed
Non-interactive Tailscale SSH sessions on FreeBSD may use the effective group ID of the tailscaled process in tailscale.com
For detailed information about this vulnerability, visit https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595 or https://nvd.nist.gov/vuln/detail/CVE-2023-28436.
Affected Modules
-
PathGo Versions
-
from v1.34.0 before v1.38.2
Aliases
References
- https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595
- https://nvd.nist.gov/vuln/detail/CVE-2023-28436
- https://github.com/tailscale/tailscale/commit/d00c046b723dff6e3775d7d35f891403ac21a47d
- https://github.com/tailscale/tailscale/releases/tag/v1.38.2
- https://tailscale.com/security-bulletins/#ts-2023-003
- https://vuln.go.dev/ID/GO-2023-1671.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.