Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-24531
HistoryJul 02, 2024 - 12:00 a.m.

CVE-2023-24531

2024-07-0200:00:00
ubuntu.com
ubuntu.com
5
go environment
arbitrary commands
environment variables
attack vectors
system
vulnerability
package rebuilding

AI Score

7.3

Confidence

High

Command go env is documented as outputting a shell script containing the Go
environment. However, go env doesn’t sanitize values, so executing its
output as a shell script can cause various bad bahaviors, including
executing arbitrary commands or inserting new environment variables. This
issue is relatively minor because, in general, if an attacker can set
arbitrary environment variables on a system, they have better attack
vectors than making “go env” print them out.

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays. Warning: do not include nullboot in the list of no-change rebuilds after fixing an issue in golang.