Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
References
Link | Resource |
---|---|
https://go.dev/cl/533215 | Patch |
https://go.dev/issue/63211 | Issue Tracking Patch |
https://groups.google.com/g/golang-announce/c/XBa1oHDevAo | Mailing List Release Notes |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ | Mailing List Third Party Advisory |
https://pkg.go.dev/vuln/GO-2023-2095 | Vendor Advisory |
https://security.gentoo.org/glsa/202311-09 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20231020-0001/ | Third Party Advisory |
Configurations
History
04 Jan 2024, 18:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://security.gentoo.org/glsa/202311-09 - Third Party Advisory |
25 Nov 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-05 21:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-39323
Mitre link : CVE-2023-39323
CVE.ORG link : CVE-2023-39323
JSON object : View
Products Affected
fedoraproject
- fedora
golang
- go
CWE