* [Buildroot] [git commit] package/go: security bump to version 1.9.10
@ 2023-06-06 19:56 Peter Korsgaard
2023-06-14 13:51 ` Peter Korsgaard
0 siblings, 1 reply; 2+ messages in thread
From: Peter Korsgaard @ 2023-06-06 19:56 UTC (permalink / raw)
To: buildroot
commit: https://git.buildroot.net/buildroot/commit/?id=620ce32227b0722c9c68c5d0cd42d8600a18ca6b
branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master
Fixes the following security issues:
- cmd/go: cgo code injection
The go command may generate unexpected code at build time when using cgo.
This may result in unexpected behavior when running a go program which
uses cgo.
This may occur when running an untrusted module which contains directories
with newline characters in their names. Modules which are retrieved using
the go command, i.e. via "go get", are not affected (modules retrieved
using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
Thanks to Juho Nurminen of Mattermost for reporting this issue.
This is CVE-2023-29402 and Go issue https://go.dev/issue/60167.
- runtime: unexpected behavior of setuid/setgid binaries
The Go runtime didn't act any differently when a binary had the
setuid/setgid bit set. On Unix platforms, if a setuid/setgid binary was
executed with standard I/O file descriptors closed, opening any files
could result in unexpected content being read/written with elevated
prilieges. Similarly if a setuid/setgid program was terminated, either
via panic or signal, it could leak the contents of its registers.
Thanks to Vincent Dehors from Synacktiv for reporting this issue.
This is CVE-2023-29403 and Go issue https://go.dev/issue/60272.
- cmd/go: improper sanitization of LDFLAGS
The go command may execute arbitrary code at build time when using cgo.
This may occur when running "go get" on a malicious module, or when
running any other command which builds untrusted code. This is can by
triggered by linker flags, specified via a "#cgo LDFLAGS" directive.
Thanks to Juho Nurminen of Mattermost for reporting this issue.
This is CVE-2023-29404 and CVE-2023-29405 and Go issues
https://go.dev/issue/60305 and https://go.dev/issue/60306.
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
package/go/go.hash | 2 +-
package/go/go.mk | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/go/go.hash b/package/go/go.hash
index ffe42bf395..874737ea2d 100644
--- a/package/go/go.hash
+++ b/package/go/go.hash
@@ -1,3 +1,3 @@
# From https://go.dev/dl
-sha256 131190a4697a70c5b1d232df5d3f55a3f9ec0e78e40516196ffb3f09ae6a5744 go1.19.9.src.tar.gz
+sha256 13755bcce529747d5f2930dee034730c86d02bd3e521ab3e2bbede548d3b953f go1.19.10.src.tar.gz
sha256 2d36597f7117c38b006835ae7f537487207d8ec407aa9d9980794b2030cbc067 LICENSE
diff --git a/package/go/go.mk b/package/go/go.mk
index 89c3577982..545d2117b7 100644
--- a/package/go/go.mk
+++ b/package/go/go.mk
@@ -4,7 +4,7 @@
#
################################################################################
-GO_VERSION = 1.19.9
+GO_VERSION = 1.19.10
GO_SITE = https://storage.googleapis.com/golang
GO_SOURCE = go$(GO_VERSION).src.tar.gz
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [Buildroot] [git commit] package/go: security bump to version 1.9.10
2023-06-06 19:56 [Buildroot] [git commit] package/go: security bump to version 1.9.10 Peter Korsgaard
@ 2023-06-14 13:51 ` Peter Korsgaard
0 siblings, 0 replies; 2+ messages in thread
From: Peter Korsgaard @ 2023-06-14 13:51 UTC (permalink / raw)
To: buildroot
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:
> commit: https://git.buildroot.net/buildroot/commit/?id=620ce32227b0722c9c68c5d0cd42d8600a18ca6b
> branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master
> Fixes the following security issues:
> - cmd/go: cgo code injection
> The go command may generate unexpected code at build time when using cgo.
> This may result in unexpected behavior when running a go program which
> uses cgo.
> This may occur when running an untrusted module which contains directories
> with newline characters in their names. Modules which are retrieved using
> the go command, i.e. via "go get", are not affected (modules retrieved
> using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
> Thanks to Juho Nurminen of Mattermost for reporting this issue.
> This is CVE-2023-29402 and Go issue https://go.dev/issue/60167.
> - runtime: unexpected behavior of setuid/setgid binaries
> The Go runtime didn't act any differently when a binary had the
> setuid/setgid bit set. On Unix platforms, if a setuid/setgid binary was
> executed with standard I/O file descriptors closed, opening any files
> could result in unexpected content being read/written with elevated
> prilieges. Similarly if a setuid/setgid program was terminated, either
> via panic or signal, it could leak the contents of its registers.
> Thanks to Vincent Dehors from Synacktiv for reporting this issue.
> This is CVE-2023-29403 and Go issue https://go.dev/issue/60272.
> - cmd/go: improper sanitization of LDFLAGS
> The go command may execute arbitrary code at build time when using cgo.
> This may occur when running "go get" on a malicious module, or when
> running any other command which builds untrusted code. This is can by
> triggered by linker flags, specified via a "#cgo LDFLAGS" directive.
> Thanks to Juho Nurminen of Mattermost for reporting this issue.
> This is CVE-2023-29404 and CVE-2023-29405 and Go issues
> https://go.dev/issue/60305 and https://go.dev/issue/60306.
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Committed to 2023.02.x, thanks.
--
Bye, Peter Korsgaard
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-06-14 13:51 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-06-06 19:56 [Buildroot] [git commit] package/go: security bump to version 1.9.10 Peter Korsgaard
2023-06-14 13:51 ` Peter Korsgaard
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox