Command go env is documented as outputting a shell script containing the Go
environment. However, go env doesn’t sanitize values, so executing its
output as a shell script can cause various bad bahaviors, including
executing arbitrary commands or inserting new environment variables. This
issue is relatively minor because, in general, if an attacker can set
arbitrary environment variables on a system, they have better attack
vectors than making “go env” print them out.
Author | Note |
---|---|
mdeslaur | Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays. Warning: do not include nullboot in the list of no-change rebuilds after fixing an issue in golang. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 14.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.10 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-1.13 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.14 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-1.16 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-1.16 | < any | UNKNOWN |
go.dev/cl/488375
go.dev/cl/493535
go.dev/issue/58508
groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ
launchpad.net/bugs/cve/CVE-2023-24531
nvd.nist.gov/vuln/detail/CVE-2023-24531
pkg.go.dev/vuln/GO-2024-2962
security-tracker.debian.org/tracker/CVE-2023-24531
www.cve.org/CVERecord?id=CVE-2023-24531