CVE-2023-29404

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-06-08 21:15

Updated : 2023-11-25 11:15


NVD link : CVE-2023-29404

Mitre link : CVE-2023-29404

CVE.ORG link : CVE-2023-29404


JSON object : View

Products Affected

golang

  • go

fedoraproject

  • fedora
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')