NA

CVE-2023-39323

Published: 05/10/2023 Updated: 04/01/2024
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

golang go

fedoraproject fedora 37

fedoraproject fedora 38

fedoraproject fedora 39

Vendor Advisories

Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation This can result in unexpected execution of arbitrary code when running "go build" The line directive requires the absolute path of the file in which the directive lives, which make ...
An issue was found in libcurl which allows cookies to be inserted into a running program if specific conditions are met The libcurl provided function, curl_easy_duphandle(), is used to duplicate the easy_handle associated with a transfer If a duplicated transfer's easy_handle has cookies enabled when it is duplicated, the cookie-enabled state is ...
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation This can result in unexpected execution of arbitrary code when running "go build" The line directive requires the absolute path of the file in which the directive lives, which make ...