First published: Thu Jun 08 2023(Updated: )
Golang Go could allow a remote attacker to execute arbitrary code on the system, caused by the generation of unexpected code at build time when using cgo. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.10 | |
Golang Go | >=1.20.0<1.20.5 | |
Fedoraproject Fedora | =38 | |
redhat/go | <1.20.5 | 1.20.5 |
redhat/go | <1.19.10 | 1.19.10 |
IBM Cloud Pak for Business Automation | <=V23.0.1 - V23.0.1-IF002 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF024 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF006 and later fixesV22.0.1 - V22.0.1-IF006 and later fixesV21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes | |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29402 is a vulnerability in the go command that may generate unexpected code at build time when using cgo, resulting in unexpected behavior when running a go program.
CVE-2023-29402 may cause unexpected behavior in go programs that use cgo.
Go versions up to 1.19.10 and versions 1.20.0 to 1.20.5 are affected by CVE-2023-29402.
Applying the latest security updates for Go is recommended to mitigate CVE-2023-29402.
You can find more information about CVE-2023-29402 on the following links: [link1](https://go.dev/cl/501226), [link2](https://go.dev/issue/60167), [link3](https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ).