6 Star 7 Fork 83

src-openEuler/golang

CVE-2023-39323

Done
CVE和安全问题 owner
Opened this issue  
2023-10-06 19:39

一、漏洞信息
漏洞编号:CVE-2023-39323
漏洞归属组件:golang
漏洞归属的版本:1.13.15,1.15.7,1.17.3,1.19.4,1.20.5
CVSS V3.0分值:
BaseScore:9.8 Critical
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
Line directives ( //line ) can be used to bypass the restrictions on //go:cgo_ directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running go build . The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
漏洞公开时间:2023-10-05 21:15:11
漏洞创建时间:2023-10-06 19:39:06
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-39323

更多参考(点击展开)
参考来源 参考链接 来源链接
security.golang.org https://go.dev/cl/533215
security.golang.org https://go.dev/issue/63211
security.golang.org https://groups.google.com/g/golang-announce/c/XBa1oHDevAo
security.golang.org https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
security.golang.org https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
security.golang.org https://pkg.go.dev/vuln/GO-2023-2095
security.golang.org https://security.netapp.com/advisory/ntap-20231020-0001/
redhat_bugzilla https://pkg.go.dev/vuln/GO-2023-2095 https://bugzilla.redhat.com/show_bug.cgi?id=2242544
redhat_bugzilla https://groups.google.com/g/golang-announce/c/XBa1oHDevAo https://bugzilla.redhat.com/show_bug.cgi?id=2242544
redhat_bugzilla https://go.dev/cl/533215 https://bugzilla.redhat.com/show_bug.cgi?id=2242544
redhat_bugzilla https://go.dev/issue/63211 https://bugzilla.redhat.com/show_bug.cgi?id=2242544
anolis https://anas.openanolis.cn/cves/detail/CVE-2023-39323
cve_search https://pkg.go.dev/vuln/GO-2023-2095
cve_search https://groups.google.com/g/golang-announce/c/XBa1oHDevAo
cve_search https://go.dev/cl/533215
cve_search https://go.dev/issue/63211
cve_search https://security.netapp.com/advisory/ntap-20231020-0001/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
go https://go.dev/issue/63211 https://github.com/golang/vulndb/blob/master/reports/GO-2023-2095.yaml
go https://go.dev/cl/533215 https://github.com/golang/vulndb/blob/master/reports/GO-2023-2095.yaml
go https://groups.google.com/g/golang-announce/c/XBa1oHDevAo https://github.com/golang/vulndb/blob/master/reports/GO-2023-2095.yaml
osv https://go.dev/issue/63211 https://osv.dev/vulnerability/GO-2023-2095
osv https://go.dev/cl/533215 https://osv.dev/vulnerability/GO-2023-2095
osv https://groups.google.com/g/golang-announce/c/XBa1oHDevAo https://osv.dev/vulnerability/GO-2023-2095
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2023-39323 https://explore.alas.aws.amazon.com/CVE-2023-39323.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39323 https://explore.alas.aws.amazon.com/CVE-2023-39323.html
nvd https://pkg.go.dev/vuln/GO-2023-2095
nvd https://groups.google.com/g/golang-announce/c/XBa1oHDevAo
nvd https://go.dev/cl/533215
nvd https://go.dev/issue/63211
redhat https://access.redhat.com/security/cve/CVE-2023-39323
security.golang.org https://go.dev/cl/533215
security.golang.org https://go.dev/issue/63211
security.golang.org https://groups.google.com/g/golang-announce/c/XBa1oHDevAo
security.golang.org https://pkg.go.dev/vuln/GO-2023-2095

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)

二、漏洞分析结构反馈
影响性分析说明:
Line directives ( //line ) can be used to bypass the restrictions on //go:cgo_ directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running go build . The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
openEuler评分:
7.4
Vector:CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响
6.openEuler-20.03-LTS-SP4:受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否
6.openEuler-20.03-LTS-SP4:否

Comments (15)

openeuler-ci-bot createdCVE和安全问题 2 years ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
2 years ago
Expand operation logs
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago
参考网址 关联pr 状态 补丁链接
https://ubuntu.com/security/CVE-2023-39323NoneNonehttps://discourse.ubuntu.com/c/ubuntu-pro
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39323
https://security-tracker.debian.org/tracker/CVE-2023-39323

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot set start time to 2023-10-06 2 years ago
openeuler-ci-bot set deadline to 2023-10-13 2 years ago
openeuler-ci-bot set priority to Serious 2 years ago
hc-hcnbxx hc member 2 years ago

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否

luoyujie through merging Pull Request !262: [Backport]fix CVE-2023-39323 changed issue state from 待办的 to 已完成 2 years ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot removed
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot removed
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot added
 
CVE/UNAFFECTED
label
2 years ago
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot changed start time from 2023-10-06 to 2023-10-13 2 years ago
openeuler-ci-bot changed deadline from 2023-10-13 to 2023-10-27 2 years ago
hc related pull requestsrc-openEuler/golang Pull Request !274 2 years ago
hc related pull requestsrc-openEuler/golang Pull Request !277 2 years ago
caodongxia changed issue state from 已完成 to 待办的 2 years ago
openeuler-ci-bot removed
 
CVE/UNAFFECTED
label
2 years ago
openeuler-ci-bot removed
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否

/approve

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否

openeuler-ci-bot changed description 2 years ago
caodongxia changed issue state from 待办的 to 已完成 2 years ago
openeuler-ci-bot changed issue state from 已完成 to 待办的 2 years ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot removed
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago

影响性分析说明:
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.

openEuler评分:
7.4
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.15.7):受影响
2.openEuler-20.03-LTS-SP3(1.15.7):受影响
3.openEuler-22.03-LTS(1.17.3):受影响
4.openEuler-22.03-LTS-SP1(1.17.3):受影响
5.openEuler-22.03-LTS-SP2(1.17.3):受影响
6.openEuler-20.03-LTS-SP4(1.15.7):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.15.7):否
2.openEuler-20.03-LTS-SP3(1.15.7):否
3.openEuler-22.03-LTS(1.17.3):否
4.openEuler-22.03-LTS-SP1(1.17.3):否
5.openEuler-22.03-LTS-SP2(1.17.3):否
6.openEuler-20.03-LTS-SP4(1.15.7):否

openeuler-ci-bot changed description 2 years ago
caodongxia changed issue state from 待办的 to 已完成 2 years ago
openeuler-ci-bot removed
 
CVE/UNFIXED
label
2 years ago
openeuler-ci-bot removed
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot added
 
CVE/FIXED
label
2 years ago
openeuler-ci-bot added
 
sig/sig-golang
label
2 years ago
openeuler-ci-bot changed start time from 2023-10-13 to 2023-10-20 2 years ago
openeuler-ci-bot changed deadline from 2023-10-27 to 2023-11-03 2 years ago

Sign in to comment

Status
Assignees
Projects
Milestones
Pull Requests
Successfully merging a pull request will close this issue.
Branches
Planed to start   -   Planed to end
-
Top level
Priority
Duration (hours)
参与者(5)
5329419 openeuler ci bot 1632792936 hc-hcnbxx weiwei123-weiwei123444 Luoyukai-luoyukai caodongxia-caodongxia
1
https://gitee.com/src-openeuler/golang.git
git@gitee.com:src-openeuler/golang.git
src-openeuler
golang
golang

Search