The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Go

Published: 2023-06-08T20:19:17.548Z

Updated: 2024-01-04T18:09:18.646Z

Reserved: 2023-04-05T19:36:35.043Z


Link: CVE-2023-29404

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-06-08T21:15:17.077

Modified: 2023-11-25T11:15:14.573


Link: CVE-2023-29404

JSON object: View

cve-icon Redhat Information

No data.

CWE