The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | golang | 2023-09-27 22:15 | ALAS-2023-1848 |
Amazon Linux 2 - Core | golang | 2023-07-20 17:29 | ALAS2-2023-2163 |
Amazon Linux 2 - Golang1.19 Extra | golang | 2023-08-07 05:59 | ALAS2GOLANG1.19-2023-001 |
Amazon Linux 2023 | golang | 2023-07-19 21:24 | ALAS2023-2023-269 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.1 | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L |
NVD | CVSSv3 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |