安全公告/【CVE-2023-29404】
基本信息
受影响操作系统:Asianux
危险等级:超危
影响源码包:golang
CVSS评分:9.8
发现日期:2023-08-29
修复版本:golang-1.15.7-29
漏洞描述
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
漏洞判定
执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
修复方式
yum update PackageName