漏洞信息详情
Google Golang 安全漏洞
漏洞简介
Google Golang是美国谷歌(Google)公司的一种静态强类型、编译型语言。Go的语法接近C语言,但对于变量的声明有所不同。Go支持垃圾回收功能。Go的并行模型是以东尼·霍尔的通信顺序进程(CSP)为基础,采取类似模型的其他语言包括Occam和Limbo,但它也具有Pi运算的特征,比如通道传输。在1.8版本中开放插件(Plugin)的支持,这意味着现在能从Go中动态加载部分函数。
golang存在安全漏洞,Golang Go 容易受到拒绝服务的攻击,这是由 math/big.Rat 的 SetString 和 UnmarshalText 方法中的缺陷引起的。通过发送特制的输入,远程攻击者可以利用此漏洞造成恐慌或不可恢复的致命错误,并导致拒绝服务条件。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
参考网址
来源:MISC
链接:https://groups.google.com/g/golang-announce
来源:MISC
链接:https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164867/Red-Hat-Security-Advisory-2021-4156-02.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164192/Red-Hat-Security-Advisory-2021-3556-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2939
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2735
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2897
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164559/Red-Hat-Security-Advisory-2021-3820-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2959
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164755/Red-Hat-Security-Advisory-2021-4104-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-four-vulnerabilities-35792
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3649
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2681
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021090126
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163805/Red-Hat-Security-Advisory-2021-3009-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164178/Red-Hat-Security-Advisory-2021-3555-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3015
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164164/Red-Hat-Security-Advisory-2021-3487-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021100408
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3476
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164223/Red-Hat-Security-Advisory-2021-3598-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164543/Red-Hat-Security-Advisory-2021-3759-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163764/Red-Hat-Security-Advisory-2021-2984-01.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6488893
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3117
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3810
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164004/Red-Hat-Security-Advisory-2021-3248-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164076/Red-Hat-Security-Advisory-2021-3454-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021110313
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021090832
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021102118
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6513717
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3466
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2255
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3168
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-33198
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3141
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2293
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163957/Red-Hat-Security-Advisory-2021-3361-01.html
受影响实体
暂无
补丁
- Google Golang 安全漏洞的修复措施<!--2021-6-28-->
还没有评论,来说两句吧...