
Cloud Vulnerability DB
A community-led vulnerabilities database
The Go programming language identified a critical security vulnerability (CVE-2022-29405) where the go command may execute arbitrary code at build time when using cgo. This vulnerability was disclosed in May 2022 and affects the Go toolset and golang packages across multiple platforms (Oracle Linux, Ubuntu).
The vulnerability has a CVSS v3.1 base score of 9.8 (Critical) with the following characteristics: Network attack vector, Low attack complexity, No privileges required, No user interaction needed, Unchanged scope, and High impact on confidentiality, integrity, and availability. The issue specifically relates to the go command's handling of cgo directives during build time, which could allow arbitrary code execution (Oracle Linux).
If exploited, this vulnerability allows attackers to execute arbitrary code during the build process when using cgo. This presents a significant security risk as it could lead to complete system compromise during the build phase of Go applications (Ubuntu).
The vulnerability has been patched in various distributions. Ubuntu users should update to the patched versions: golang-1.18 (1.18.1-1ubuntu1.2) for Ubuntu 22.04, golang-1.18 (1.18.1-1ubuntu1~20.04.3) for Ubuntu 20.04, and equivalent versions for other releases (Ubuntu). Oracle Linux users should apply the relevant Critical Patch Update security patches without delay (Oracle Linux).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."