Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-39323
HistoryOct 05, 2023 - 9:15 p.m.

CVE-2023-39323

2023-10-0521:15:11
Debian Security Bug Tracker
security-tracker.debian.org
18
line directives
go build
compiler flags
unix
cve-2023-39323

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.2%

Line directives (โ€œ//lineโ€) can be used to bypass the restrictions on โ€œ//go:cgo_โ€ directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running โ€œgo buildโ€. The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

OSVersionArchitecturePackageVersionFilename
Debian11allgolang-1.15<=ย 1.15.15-1~deb11u4golang-1.15_1.15.15-1~deb11u4_all.deb
Debian12allgolang-1.19<=ย 1.19.8-2golang-1.19_1.19.8-2_all.deb

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.2%