Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-29404


The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.


Published

2023-06-08T21:15:17.077

Last Modified

2025-01-06T20:15:26.040

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application golang go < 1.19.10 Yes
Application golang go < 1.20.5 Yes
Operating System fedoraproject fedora 38 Yes

References