Google Go 参数注入漏洞

admin 2024-01-15 20:12:45 YS 来源:ZONE.CI 全球网 0 阅读模式
> Google Go 参数注入漏洞

Google Go 参数注入漏洞

CNNVD-ID编号 CNNVD-202011-1428 CVE编号 CVE-2020-28367
发布时间 2020-11-16 更新时间 2021-01-21
漏洞类型 参数注入 漏洞来源 N/A
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。

go 1.15.5,1之前版本存在安全漏洞,该漏洞源于当使用cgo时,go命令可能在构建时执行任意代码。当在恶意包上运行go get或构建不受信任代码的任何其他命令时,可能会出现这种情况。

漏洞补丁

目前厂商已发布升级了Google Go 参数注入漏洞的补丁,Google Go 参数注入漏洞的补丁获取链接:

参考网址

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html

来源:CONFIRM

链接:https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM

来源:MISC

链接:https://github.com/golang/go/issues/42556

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20201202-0004/

来源:MLIST

链接:https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4130/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160961/Red-Hat-Security-Advisory-2021-0146-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160955/Red-Hat-Security-Advisory-2021-0145-01.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-28367

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-integration-is-affected-by-multiple-go-vulnerabilities/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160340/Red-Hat-Security-Advisory-2020-5333-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4287/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4442/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4063/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Go-code-execution-via-Argument-Injection-33936

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-enterprise-certified-container-operator-and-integration-servers-are-vulnerable-to-code-injection-and-denial-of-service-attacks/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160526/Red-Hat-Security-Advisory-2020-5493-01.html

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202011-1428

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0