CVE Vulnerabilities

CVE-2023-39323

Published: Oct 05, 2023 | Modified: Jun 12, 2025
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.1 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Line directives (//line) can be used to bypass the restrictions on //go:cgo_ directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running go build. The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

Affected Software

NameVendorStart VersionEnd Version
GoGolang*1.20.9 (excluding)
GoGolang1.21.0 (including)1.21.2 (excluding)
Red Hat Enterprise Linux 8RedHatgo-toolset:rhel8-8090020231013032436.26eb71ac*
Red Hat Enterprise Linux 8RedHatgo-toolset:rhel8/go-toolset-1.20.10-3*
Red Hat Enterprise Linux 8RedHatubi8/go-toolset:1.20.10-3*
Golang-1.17Ubuntujammy*
Golang-1.18Ubuntuesm-apps/bionic*
Golang-1.18Ubuntuesm-apps/focal*
Golang-1.18Ubuntuesm-apps/xenial*
Golang-1.18Ubuntufocal*
Golang-1.18Ubuntujammy*
Golang-1.19Ubuntubionic*
Golang-1.19Ubuntulunar*
Golang-1.19Ubuntutrusty*
Golang-1.19Ubuntuxenial*
Golang-1.20Ubuntubionic*
Golang-1.20Ubuntuesm-apps/focal*
Golang-1.20Ubuntuesm-apps/jammy*
Golang-1.20Ubuntufocal*
Golang-1.20Ubuntujammy*
Golang-1.20Ubuntulunar*
Golang-1.20Ubuntumantic*
Golang-1.20Ubuntutrusty*
Golang-1.20Ubuntuupstream*
Golang-1.20Ubuntuxenial*
Golang-1.21Ubuntubionic*
Golang-1.21Ubuntuesm-apps/focal*
Golang-1.21Ubuntuesm-apps/jammy*
Golang-1.21Ubuntufocal*
Golang-1.21Ubuntujammy*
Golang-1.21Ubuntulunar*
Golang-1.21Ubuntumantic*
Golang-1.21Ubuntutrusty*
Golang-1.21Ubuntuupstream*
Golang-1.21Ubuntuxenial*

References