CVE-2020-28366

Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
References
Link Resource
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM Mailing List Release Notes Third Party Advisory
https://pkg.go.dev/vuln/GO-2022-0475 Vendor Advisory
https://go.dev/cl/269658 Patch Vendor Advisory
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292 Mailing List Patch
https://go.dev/issue/42559 Issue Tracking Patch Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*

Information

Published : 2020-11-18 09:15

Updated : 2023-02-28 06:52


NVD link : CVE-2020-28366

Mitre link : CVE-2020-28366


JSON object : View

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

Advertisement

dedicated server usa

Products Affected

golang

  • go

netapp

  • cloud_insights_telegraf_agent
  • trident

fedoraproject

  • fedora