The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "38"
}
]
}
]
}{
"cpe": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.19.10"
},
{
"introduced": "1.20.0"
},
{
"fixed": "1.20.5"
}
]
}