Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43055 | Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. |
Ubuntu USN |
USN-6574-1 | Go vulnerabilities |
Ubuntu USN |
USN-7109-1 | Go vulnerabilities |
Ubuntu USN |
USN-7111-1 | Go vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 12 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 08 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-06-12T15:15:12.065Z
Reserved: 2023-07-27T17:05:55.188Z
Link: CVE-2023-39323
Updated: 2024-08-02T18:02:06.899Z
Status : Modified
Published: 2023-10-05T21:15:11.283
Modified: 2025-06-12T16:15:20.520
Link: CVE-2023-39323
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN