Back to bug 2217569

Who When What Removed Added
Pedro Sampaio 2023-06-26 17:59:06 UTC Depends On 2217570, 2217571
Pedro Sampaio 2023-06-26 18:00:51 UTC Blocks 2217573
Pedro Sampaio 2023-06-26 18:09:02 UTC Depends On 2217619, 2217621, 2217617, 2217625, 2217626, 2217615, 2217623, 2217620, 2217624, 2217627, 2217616, 2217622, 2217618
TEJ RATHI 2023-06-27 04:42:45 UTC Summary CVE-2023-29405 golang: Arbitratry code execution triggered by linker flags CVE-2023-29405 golang: cmd/go: Arbitratry code execution triggered by linker flags
TEJ RATHI 2023-06-27 04:45:01 UTC Summary CVE-2023-29405 golang: cmd/go: Arbitratry code execution triggered by linker flags CVE-2023-29405 golang: cmd/go,cmd/cgo: Arbitratry code execution triggered by linker flags
Anten Skrabec 2023-06-27 22:02:33 UTC Summary CVE-2023-29405 golang: cmd/go,cmd/cgo: Arbitratry code execution triggered by linker flags CVE-2023-29405 golang: cmd/cgo: Arbitratry code execution triggered by linker flags
errata-xmlrpc 2023-06-29 05:30:56 UTC Link ID Red Hat Product Errata RHSA-2023:3920
errata-xmlrpc 2023-06-29 09:07:27 UTC Link ID Red Hat Product Errata RHSA-2023:3922
errata-xmlrpc 2023-06-29 09:45:26 UTC Link ID Red Hat Product Errata RHSA-2023:3923
errata-xmlrpc 2023-06-29 13:45:52 UTC Link ID Red Hat Product Errata RHBA-2023:3940
errata-xmlrpc 2023-06-29 14:13:29 UTC Link ID Red Hat Product Errata RHBA-2023:3941
Product Security DevOps Team 2023-06-29 14:19:42 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-06-29 14:19:42 UTC
Anten Skrabec 2023-06-29 19:18:43 UTC Doc Text The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
Paige Jung 2023-06-29 19:38:46 UTC Doc Text The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler. A flaw was found in golang. The go command may execute arbitrary code at build time when using cgo. This can occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This can be triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
errata-xmlrpc 2023-06-30 02:50:35 UTC Link ID Red Hat Product Errata RHBA-2023:3956

Back to bug 2217569