RLSA-2023:3923

Source
https://errata.rockylinux.org/RLSA-2023:3923
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:3923.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:3923
Related
Published
2023-07-08T02:54:41.143214Z
Modified
2023-07-08T02:55:45.423349Z
Summary
Critical: go-toolset and golang security update
Details

Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

The golang packages provide the Go programming language compiler.

Security Fix(es):

  • golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402)

  • golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404)

  • golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405)

  • golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / golang

Package

Name
golang
Purl
pkg:rpm/rocky-linux/golang?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:1.19.10-1.el9_2

Rocky Linux:9 / go-toolset

Package

Name
go-toolset
Purl
pkg:rpm/rocky-linux/go-toolset?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:1.19.10-1.el9_2