漏洞信息详情
Google Go 注入漏洞
漏洞简介
Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。
Google Go 1.11.5版本中的net/http存在CRLF注入漏洞。远程攻击者可利用该漏洞操纵HTTP报头并攻击内部主机。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/golang/go/issues/30794
参考网址
来源:BID
链接:http://www.securityfocus.com/bid/107432
来源:MISC
链接:https://github.com/golang/go/issues/30794
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1519
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1300
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
来源:BID
链接:https://www.securityfocus.com/bid/107432
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/04/msg00007.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10888071
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10888065
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10884414
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10888067
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/04/msg00007.html
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1300
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1951/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1143484
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9741
来源:http-CRLF-Injection-28941
链接:http-CRLF-Injection-28941
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-information-disclosure-via-Net-
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107432
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/78386
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0891
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/80138
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10882596
受影响实体
暂无
补丁
- Google Go 注入漏洞的修复措施<!--2019-3-13-->
还没有评论,来说两句吧...