Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [git commit] package/go: security bump to version 1.9.10
@ 2023-06-06 19:56 Peter Korsgaard
  2023-06-14 13:51 ` Peter Korsgaard
  0 siblings, 1 reply; 2+ messages in thread
From: Peter Korsgaard @ 2023-06-06 19:56 UTC (permalink / raw)
  To: buildroot

commit: https://git.buildroot.net/buildroot/commit/?id=620ce32227b0722c9c68c5d0cd42d8600a18ca6b
branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master

Fixes the following security issues:

- cmd/go: cgo code injection

  The go command may generate unexpected code at build time when using cgo.
  This may result in unexpected behavior when running a go program which
  uses cgo.

  This may occur when running an untrusted module which contains directories
  with newline characters in their names.  Modules which are retrieved using
  the go command, i.e.  via "go get", are not affected (modules retrieved
  using GOPATH-mode, i.e.  GO111MODULE=off, may be affected).

  Thanks to Juho Nurminen of Mattermost for reporting this issue.

  This is CVE-2023-29402 and Go issue https://go.dev/issue/60167.

- runtime: unexpected behavior of setuid/setgid binaries

  The Go runtime didn't act any differently when a binary had the
  setuid/setgid bit set.  On Unix platforms, if a setuid/setgid binary was
  executed with standard I/O file descriptors closed, opening any files
  could result in unexpected content being read/written with elevated
  prilieges.  Similarly if a setuid/setgid program was terminated, either
  via panic or signal, it could leak the contents of its registers.

  Thanks to Vincent Dehors from Synacktiv for reporting this issue.

  This is CVE-2023-29403 and Go issue https://go.dev/issue/60272.

- cmd/go: improper sanitization of LDFLAGS

  The go command may execute arbitrary code at build time when using cgo.
  This may occur when running "go get" on a malicious module, or when
  running any other command which builds untrusted code.  This is can by
  triggered by linker flags, specified via a "#cgo LDFLAGS" directive.

  Thanks to Juho Nurminen of Mattermost for reporting this issue.

  This is CVE-2023-29404 and CVE-2023-29405 and Go issues
  https://go.dev/issue/60305 and https://go.dev/issue/60306.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/go/go.hash | 2 +-
 package/go/go.mk   | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/go/go.hash b/package/go/go.hash
index ffe42bf395..874737ea2d 100644
--- a/package/go/go.hash
+++ b/package/go/go.hash
@@ -1,3 +1,3 @@
 # From https://go.dev/dl
-sha256  131190a4697a70c5b1d232df5d3f55a3f9ec0e78e40516196ffb3f09ae6a5744  go1.19.9.src.tar.gz
+sha256  13755bcce529747d5f2930dee034730c86d02bd3e521ab3e2bbede548d3b953f  go1.19.10.src.tar.gz
 sha256  2d36597f7117c38b006835ae7f537487207d8ec407aa9d9980794b2030cbc067  LICENSE
diff --git a/package/go/go.mk b/package/go/go.mk
index 89c3577982..545d2117b7 100644
--- a/package/go/go.mk
+++ b/package/go/go.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-GO_VERSION = 1.19.9
+GO_VERSION = 1.19.10
 GO_SITE = https://storage.googleapis.com/golang
 GO_SOURCE = go$(GO_VERSION).src.tar.gz
 
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [Buildroot] [git commit] package/go: security bump to version 1.9.10
  2023-06-06 19:56 [Buildroot] [git commit] package/go: security bump to version 1.9.10 Peter Korsgaard
@ 2023-06-14 13:51 ` Peter Korsgaard
  0 siblings, 0 replies; 2+ messages in thread
From: Peter Korsgaard @ 2023-06-14 13:51 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > commit: https://git.buildroot.net/buildroot/commit/?id=620ce32227b0722c9c68c5d0cd42d8600a18ca6b
 > branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master

 > Fixes the following security issues:

 > - cmd/go: cgo code injection

 >   The go command may generate unexpected code at build time when using cgo.
 >   This may result in unexpected behavior when running a go program which
 >   uses cgo.

 >   This may occur when running an untrusted module which contains directories
 >   with newline characters in their names.  Modules which are retrieved using
 >   the go command, i.e.  via "go get", are not affected (modules retrieved
 >   using GOPATH-mode, i.e.  GO111MODULE=off, may be affected).

 >   Thanks to Juho Nurminen of Mattermost for reporting this issue.

 >   This is CVE-2023-29402 and Go issue https://go.dev/issue/60167.

 > - runtime: unexpected behavior of setuid/setgid binaries

 >   The Go runtime didn't act any differently when a binary had the
 >   setuid/setgid bit set.  On Unix platforms, if a setuid/setgid binary was
 >   executed with standard I/O file descriptors closed, opening any files
 >   could result in unexpected content being read/written with elevated
 >   prilieges.  Similarly if a setuid/setgid program was terminated, either
 >   via panic or signal, it could leak the contents of its registers.

 >   Thanks to Vincent Dehors from Synacktiv for reporting this issue.

 >   This is CVE-2023-29403 and Go issue https://go.dev/issue/60272.

 > - cmd/go: improper sanitization of LDFLAGS

 >   The go command may execute arbitrary code at build time when using cgo.
 >   This may occur when running "go get" on a malicious module, or when
 >   running any other command which builds untrusted code.  This is can by
 >   triggered by linker flags, specified via a "#cgo LDFLAGS" directive.

 >   Thanks to Juho Nurminen of Mattermost for reporting this issue.

 >   This is CVE-2023-29404 and CVE-2023-29405 and Go issues
 >   https://go.dev/issue/60305 and https://go.dev/issue/60306.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2023.02.x, thanks.

-- 
Bye, Peter Korsgaard
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-06-14 13:51 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-06-06 19:56 [Buildroot] [git commit] package/go: security bump to version 1.9.10 Peter Korsgaard
2023-06-14 13:51 ` Peter Korsgaard

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox