First published: Thu Jun 08 2023(Updated: )
Golang Go could allow a remote attacker to execute arbitrary code on the system, caused by a flaw when running "go get" on a malicious module. By sending a specially crafted request using linker flags, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.10 | |
Golang Go | >=1.20.0<1.20.5 | |
Fedoraproject Fedora | =38 | |
IBM Storage Protect Plus vSnap | <=10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29405 is a vulnerability in the go command that allows for the execution of arbitrary code at build time when using cgo.
CVE-2023-29405 can occur when running "go get" on a malicious module or any other command that builds untrusted code, triggered by linker flags specified via a "#cgo LDFLAGS" directive.
Versions of the go command up to version 1.19.10, versions 1.20.0 to 1.20.5, and Fedora version 38 are affected by CVE-2023-29405.
CVE-2023-29405 has a severity rating of 9.8, which is considered critical.
To fix CVE-2023-29405, it is recommended to update to a version of the go command that is not affected by the vulnerability.