You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Name: go CVEs: CVE-2023-39323 CVSSs: 9.8 Action Needed: update to >= 1.20.9
Summary: cmd/go: line directives allows arbitrary execution during build. "//line" directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compliation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploting this issue significantly more complex.
Name: go
CVEs: CVE-2023-39323
CVSSs: 9.8
Action Needed: update to >= 1.20.9
Summary: cmd/go: line directives allows arbitrary execution during build. "//line" directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compliation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploting this issue significantly more complex.
See also https://groups.google.com/g/golang-announce/c/XBa1oHDevAo.
refmap.gentoo: TBD
The text was updated successfully, but these errors were encountered: