{"uuid": "f1fdf2c9-41ac-4c9d-9d89-a92116e06a76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29402", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/241", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29402\n\ud83d\udd39 Description: The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).\n\ud83d\udccf Published: 2023-06-08T20:19:04.483Z\n\ud83d\udccf Modified: 2025-01-06T21:14:36.576Z\n\ud83d\udd17 References:\n1. https://go.dev/issue/60167\n2. https://go.dev/cl/501226\n3. https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ\n4. https://pkg.go.dev/vuln/GO-2023-1839\n5. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/\n6. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/\n7. https://security.gentoo.org/glsa/202311-09", "creation_timestamp": "2025-01-06T21:36:52.000000Z"}