漏洞信息详情
Google Golang 代码注入漏洞
漏洞简介
Google Golang是美国谷歌(Google)公司的一种静态强类型、编译型语言。Go的语法接近C语言,但对于变量的声明有所不同。Go支持垃圾回收功能。Go的并行模型是以东尼·霍尔的通信顺序进程(CSP)为基础,采取类似模型的其他语言包括Occam和Limbo,但它也具有Pi运算的特征,比如通道传输。在1.8版本中开放插件(Plugin)的支持,这意味着现在能从Go中动态加载部分函数。
Go 1.14.14之前和1.15.7之前存在代码注入漏洞,该漏洞源于当使用 go get 命令获取使用cgo的模块时(例如,cgo可以从不受信任的下载中执行gcc程序),容易受到命令注入和远程代码执行的攻击。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://groups.google.com/g/golang-announce/c/mperVMGa98w
参考网址
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20210219-0001/
来源:CONFIRM
链接:https://blog.golang.org/path-security
来源:CONFIRM
链接:https://groups.google.com/g/golang-announce/c/mperVMGa98w
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0309/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052037
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052525
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052216
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-golang-affect-ibm-spectrum-protect-plus-container-backup-and-restore-for-kubernetes-and-openshift-cve-2021-3114-cve-2021-3115/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1726
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162306/Red-Hat-Security-Advisory-2021-1339-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042502
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1792
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-integration-is-vulnerable-to-go-vulnerabilities-cve-2021-3114-and-cve-2021-3115/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162670/Red-Hat-Security-Advisory-2021-1746-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-code-execution-via-Build-Process-34413
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1378
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-3115
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicloud-management-monitoring-has-applied-security-fixes-for-its-use-of-golang-go/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162755/Red-Hat-Security-Advisory-2021-2093-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-go-4/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vulnerable-to-go-vulnerabilities-cve-2021-3114-cve-2021-3115/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-in-go-affect-ibm-cloud-pak-for-multicloud-management-hybrid-grc-3/
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...