Skip to content

Commit 7a88f6b

Browse files
committed
data/reports: add GO-2023-1839.yaml
Aliases: CVE-2023-29402 Updates #1839 Change-Id: I4e963cfc7eebf092ffbffd56dddf1ac5f1ab61bb Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/501838 TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent 93c684c commit 7a88f6b

File tree

3 files changed

+168
-0
lines changed

3 files changed

+168
-0
lines changed

data/cve/v5/GO-2023-1839.json

+73
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2023-29402"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"descriptions": [
13+
{
14+
"lang": "en",
15+
"value": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected)."
16+
}
17+
],
18+
"affected": [
19+
{
20+
"vendor": "Go toolchain",
21+
"product": "cmd/go",
22+
"collectionURL": "https://pkg.go.dev",
23+
"packageName": "cmd/go",
24+
"versions": [
25+
{
26+
"version": "0",
27+
"lessThan": "1.19.10",
28+
"status": "affected",
29+
"versionType": "semver"
30+
},
31+
{
32+
"version": "1.20.0-0",
33+
"lessThan": "1.20.5",
34+
"status": "affected",
35+
"versionType": "semver"
36+
}
37+
],
38+
"defaultStatus": "unaffected"
39+
}
40+
],
41+
"problemTypes": [
42+
{
43+
"descriptions": [
44+
{
45+
"lang": "en",
46+
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
47+
}
48+
]
49+
}
50+
],
51+
"references": [
52+
{
53+
"url": "https://go.dev/issue/60167"
54+
},
55+
{
56+
"url": "https://go.dev/cl/501226"
57+
},
58+
{
59+
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
60+
},
61+
{
62+
"url": "https://pkg.go.dev/vuln/GO-2023-1839"
63+
}
64+
],
65+
"credits": [
66+
{
67+
"lang": "en",
68+
"value": "Juho Nurminen of Mattermost"
69+
}
70+
]
71+
}
72+
}
73+
}

data/osv/GO-2023-1839.json

+66
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-1839",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-29402"
8+
],
9+
"details": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo.\n\nThis may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).",
10+
"affected": [
11+
{
12+
"package": {
13+
"name": "toolchain",
14+
"ecosystem": "Go"
15+
},
16+
"ranges": [
17+
{
18+
"type": "SEMVER",
19+
"events": [
20+
{
21+
"introduced": "0"
22+
},
23+
{
24+
"fixed": "1.19.10"
25+
},
26+
{
27+
"introduced": "1.20.0-0"
28+
},
29+
{
30+
"fixed": "1.20.5"
31+
}
32+
]
33+
}
34+
],
35+
"ecosystem_specific": {
36+
"imports": [
37+
{
38+
"path": "cmd/go"
39+
}
40+
]
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "REPORT",
47+
"url": "https://go.dev/issue/60167"
48+
},
49+
{
50+
"type": "FIX",
51+
"url": "https://go.dev/cl/501226"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
56+
}
57+
],
58+
"credits": [
59+
{
60+
"name": "Juho Nurminen of Mattermost"
61+
}
62+
],
63+
"database_specific": {
64+
"url": "https://pkg.go.dev/vuln/GO-2023-1839"
65+
}
66+
}

data/reports/GO-2023-1839.yaml

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
id: GO-2023-1839
2+
modules:
3+
- module: cmd
4+
versions:
5+
- fixed: 1.19.10
6+
- introduced: 1.20.0-0
7+
fixed: 1.20.5
8+
vulnerable_at: 1.20.4
9+
packages:
10+
- package: cmd/go
11+
summary: Code injection via go command with cgo in cmd/go
12+
description: |
13+
The go command may generate unexpected code at build time when using cgo.
14+
This may result in unexpected behavior when running a go program which uses
15+
cgo.
16+
17+
This may occur when running an untrusted module which contains directories
18+
with newline characters in their names. Modules which are retrieved using
19+
the go command, i.e. via "go get", are not affected (modules retrieved
20+
using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
21+
credits:
22+
- Juho Nurminen of Mattermost
23+
references:
24+
- report: https://go.dev/issue/60167
25+
- fix: https://go.dev/cl/501226
26+
- web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ
27+
cve_metadata:
28+
id: CVE-2023-29402
29+
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'

0 commit comments

Comments
 (0)