Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-29404
HistoryJun 08, 2023 - 9:15 p.m.

CVE-2023-29404

2023-06-0821:15:17
Alpine Linux Development Team
security.alpinelinux.org
26
vulnerability
go command
execution
arbitrary code
cgo
ldflags
linker flags
malicious module
untrusted code
gccgo
gc compilers

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.007

Percentile

81.1%

The go command may execute arbitrary code at build time when using cgo. This may occur when running โ€œgo getโ€ on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a โ€œ#cgo LDFLAGSโ€ directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

OSVersionArchitecturePackageVersionFilename
Alpineedge-communitynoarchgo<ย 1.20.5-r0UNKNOWN
Alpine3.18-communitynoarchgo<ย 1.20.5-r0UNKNOWN
Alpine3.19-communitynoarchgo<ย 1.20.5-r0UNKNOWN
Alpine3.20-communitynoarchgo<ย 1.20.5-r0UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.007

Percentile

81.1%