CVE-2023-29404

Source
https://cve.org/CVERecord?id=CVE-2023-29404
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29404.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-29404
Aliases
Downstream
Related
Published
2023-06-08T21:15:17.077Z
Modified
2026-02-12T01:09:26.149529Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

References

Affected packages

Git / gitlab.freedesktop.org/xorg/xserver

Affected ranges

Type
GIT
Repo
https://gitlab.freedesktop.org/xorg/xserver
Events

Affected versions

xorg-server-1.*
xorg-server-1.20.0
xorg-server-1.20.1
xorg-server-1.20.2
xorg-server-1.20.3
xorg-server-1.20.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29404.json"