CVE Vulnerabilities

CVE-2023-29405

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Jun 08, 2023 | Modified: Jan 06, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The go command may execute arbitrary code at build time when using cgo. This may occur when running go get on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a #cgo LDFLAGS directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
GoGolang*1.19.10 (excluding)
GoGolang1.20.0 (including)1.20.5 (excluding)
Red Hat Ceph Storage 5.3RedHatrhceph/keepalived-rhel8:2.1.5-42*
Red Hat Ceph Storage 5.3RedHatrhceph/rhceph-5-dashboard-rhel8:5-87*
Red Hat Ceph Storage 5.3RedHatrhceph/rhceph-5-rhel8:5-519*
Red Hat Ceph Storage 5.3RedHatrhceph/rhceph-haproxy-rhel8:2.2.19-35*
Red Hat Ceph Storage 5.3RedHatrhceph/snmp-notifier-rhel8:1.2.1-69*
Red Hat Developer ToolsRedHatgo-toolset-1.19-0:1.19.10-1.el7_9*
Red Hat Developer ToolsRedHatgo-toolset-1.19-golang-0:1.19.10-1.el7_9*
Red Hat Enterprise Linux 8RedHatgo-toolset:rhel8-8080020230627164522.6b4b45d8*
Red Hat Enterprise Linux 9RedHatgolang-0:1.19.10-1.el9_2*
Red Hat Enterprise Linux 9RedHatgo-toolset-0:1.19.10-1.el9_2*
GolangUbuntubionic*
GolangUbuntutrusty*
GolangUbuntuxenial*
Golang-1.10Ubuntubionic*
Golang-1.10Ubuntutrusty*
Golang-1.10Ubuntutrusty/esm*
Golang-1.10Ubuntuxenial*
Golang-1.13Ubuntubionic*
Golang-1.13Ubuntufocal*
Golang-1.13Ubuntukinetic*
Golang-1.13Ubuntuxenial*
Golang-1.14Ubuntufocal*
Golang-1.16Ubuntubionic*
Golang-1.16Ubuntufocal*
Golang-1.16Ubuntutrusty*
Golang-1.16Ubuntuxenial*
Golang-1.17Ubuntujammy*
Golang-1.17Ubuntutrusty*
Golang-1.17Ubuntuxenial*
Golang-1.18Ubuntubionic*
Golang-1.18Ubuntuesm-apps/bionic*
Golang-1.18Ubuntuesm-apps/focal*
Golang-1.18Ubuntuesm-apps/xenial*
Golang-1.18Ubuntufocal*
Golang-1.18Ubuntujammy*
Golang-1.18Ubuntutrusty*
Golang-1.18Ubuntuxenial*
Golang-1.19Ubuntukinetic*
Golang-1.19Ubuntulunar*
Golang-1.19Ubuntutrusty*
Golang-1.19Ubuntuxenial*
Golang-1.20Ubuntufocal*
Golang-1.20Ubuntulunar*
Golang-1.20Ubuntumantic*
Golang-1.20Ubuntutrusty*
Golang-1.20Ubuntuxenial*
Golang-1.6Ubuntutrusty*
Golang-1.6Ubuntuxenial*
Golang-1.8Ubuntubionic*
Golang-1.9Ubuntubionic*

Potential Mitigations

References