Skip to content

Commit 1fca36c

Browse files
committed
data/reports: add GO-2025-3428
- data/reports/GO-2025-3428.yaml Fixes #3428 Change-Id: Ib914fe2250f049116d43a1dd9f67816d730f13e1 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/647257 Auto-Submit: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]>
1 parent d9dd106 commit 1fca36c

File tree

3 files changed

+166
-0
lines changed

3 files changed

+166
-0
lines changed

data/cve/v5/GO-2025-3428.json

+71
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2025-22867"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"title": "Arbitrary code execution during build on darwin in cmd/go",
13+
"descriptions": [
14+
{
15+
"lang": "en",
16+
"value": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the @executable_path, @loader_path, or @rpath special values in a \"#cgo LDFLAGS\" directive. This issue only affected go1.24rc2."
17+
}
18+
],
19+
"affected": [
20+
{
21+
"vendor": "Go toolchain",
22+
"product": "cmd/go",
23+
"collectionURL": "https://pkg.go.dev",
24+
"packageName": "cmd/go",
25+
"versions": [
26+
{
27+
"version": "1.24.0-rc.2",
28+
"lessThan": "1.24.0-rc.3",
29+
"status": "affected",
30+
"versionType": "semver"
31+
}
32+
],
33+
"platforms": [
34+
"darwin"
35+
],
36+
"defaultStatus": "unaffected"
37+
}
38+
],
39+
"problemTypes": [
40+
{
41+
"descriptions": [
42+
{
43+
"lang": "en",
44+
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"
45+
}
46+
]
47+
}
48+
],
49+
"references": [
50+
{
51+
"url": "https://go.dev/cl/646996"
52+
},
53+
{
54+
"url": "https://go.dev/issue/71476"
55+
},
56+
{
57+
"url": "https://groups.google.com/g/golang-dev/c/TYzikTgHK6Y"
58+
},
59+
{
60+
"url": "https://pkg.go.dev/vuln/GO-2025-3428"
61+
}
62+
],
63+
"credits": [
64+
{
65+
"lang": "en",
66+
"value": "Juho Forsén of Mattermost"
67+
}
68+
]
69+
}
70+
}
71+
}

data/osv/GO-2025-3428.json

+65
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3428",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-22867"
8+
],
9+
"summary": "Arbitrary code execution during build on darwin in cmd/go",
10+
"details": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the @executable_path, @loader_path, or @rpath special values in a \"#cgo LDFLAGS\" directive. This issue only affected go1.24rc2.",
11+
"affected": [
12+
{
13+
"package": {
14+
"name": "toolchain",
15+
"ecosystem": "Go"
16+
},
17+
"ranges": [
18+
{
19+
"type": "SEMVER",
20+
"events": [
21+
{
22+
"introduced": "1.24.0-rc.2"
23+
},
24+
{
25+
"fixed": "1.24.0-rc.3"
26+
}
27+
]
28+
}
29+
],
30+
"ecosystem_specific": {
31+
"imports": [
32+
{
33+
"path": "cmd/go",
34+
"goos": [
35+
"darwin"
36+
]
37+
}
38+
]
39+
}
40+
}
41+
],
42+
"references": [
43+
{
44+
"type": "FIX",
45+
"url": "https://go.dev/cl/646996"
46+
},
47+
{
48+
"type": "REPORT",
49+
"url": "https://go.dev/issue/71476"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://groups.google.com/g/golang-dev/c/TYzikTgHK6Y"
54+
}
55+
],
56+
"credits": [
57+
{
58+
"name": "Juho Forsén of Mattermost"
59+
}
60+
],
61+
"database_specific": {
62+
"url": "https://pkg.go.dev/vuln/GO-2025-3428",
63+
"review_status": "REVIEWED"
64+
}
65+
}

data/reports/GO-2025-3428.yaml

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: GO-2025-3428
2+
modules:
3+
- module: cmd
4+
versions:
5+
- introduced: 1.24.0-rc.2
6+
- fixed: 1.24.0-rc.3
7+
vulnerable_at: 1.24.0-rc.2
8+
packages:
9+
- package: cmd/go
10+
goos:
11+
- darwin
12+
summary: Arbitrary code execution during build on darwin in cmd/go
13+
description: |-
14+
On Darwin, building a Go module which contains CGO can trigger arbitrary code
15+
execution when using the Apple version of ld, due to usage of the
16+
@executable_path, @loader_path, or @rpath special values in a "#cgo LDFLAGS"
17+
directive. This issue only affected go1.24rc2.
18+
credits:
19+
- Juho Forsén of Mattermost
20+
references:
21+
- fix: https://go.dev/cl/646996
22+
- report: https://go.dev/issue/71476
23+
- web: https://groups.google.com/g/golang-dev/c/TYzikTgHK6Y
24+
cve_metadata:
25+
id: CVE-2025-22867
26+
cwe: 'CWE-77: Improper Neutralization of Special Elements used in a Command (''Command Injection'')'
27+
source:
28+
id: go-security-team
29+
created: 2025-02-06T10:35:16.796971-05:00
30+
review_status: REVIEWED

0 commit comments

Comments
 (0)