The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published: 2023-06-08T20:19:17.548Z

Updated: 2024-11-15T13:08:12.758Z

Reserved: 2023-04-05T19:36:35.043Z

Link: CVE-2023-29404

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-08T21:15:17.077

Modified: 2023-11-25T11:15:14.573

Link: CVE-2023-29404

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-08T00:00:00Z

Links: CVE-2023-29404 - Bugzilla