Google Go 安全漏洞
CNNVD-ID编号 | CNNVD-202006-1195 | CVE编号 | CVE-2020-14040 |
发布时间 | 2020-06-17 | 更新时间 | 2020-12-22 |
漏洞类型 | 其他 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。text package是其中的一个用于字符编码、文本转换和特定于区域设置的文本处理的软件包。
Golang Go x/text package 0.3.3之前版本存在安全漏洞。攻击者可利用该漏洞导致UTF-16解码器进入无限循环,进而导致程序崩溃或内存不足。
漏洞补丁
目前厂商已发布升级了Google Go 安全漏洞的补丁,Google Go 安全漏洞的补丁获取链接:
https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0
参考网址
来源:MISC
链接:https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0
来源:FEDORA
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158798/Red-Hat-Security-Advisory-2020-3372-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160125/Red-Hat-Security-Advisory-2020-5149-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4171/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2714/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160580/Red-Hat-Security-Advisory-2020-5606-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4513/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159515/Red-Hat-Security-Advisory-2020-4214-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3488/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3890/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-overload-via-UTF-BOM-33267
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3700/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-14040
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158512/Red-Hat-Security-Advisory-2020-3087-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159880/Red-Hat-Security-Advisory-2020-4694-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159095/Red-Hat-Security-Advisory-2020-3578-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159999/Red-Hat-Security-Advisory-2020-5055-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4100/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159187/Red-Hat-Security-Advisory-2020-3727-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4461/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2517/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3081/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159725/Red-Hat-Security-Advisory-2020-4297-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160197/Red-Hat-Security-Advisory-2020-5198-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3174/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48793
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3223.2/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202006-1195

评论