Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-39323
HistoryOct 05, 2023 - 9:15 p.m.

CVE-2023-39323

2023-10-0521:15:11
Alpine Linux Development Team
security.alpinelinux.org
36
directive bypass
arbitrary code execution
unix

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

57.2%

Line directives (โ€œ//lineโ€) can be used to bypass the restrictions on โ€œ//go:cgo_โ€ directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running โ€œgo buildโ€. The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

OSVersionArchitecturePackageVersionFilename
Alpineedge-communitynoarchgo<ย 1.21.2-r0UNKNOWN
Alpine3.18-communitynoarchgo<ย 1.20.9-r0UNKNOWN
Alpine3.19-communitynoarchgo<ย 1.21.2-r0UNKNOWN
Alpine3.20-communitynoarchgo<ย 1.21.2-r0UNKNOWN

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

57.2%