Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
References
Link | Resource |
---|---|
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM | Mailing List Release Notes Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-0475 | Vendor Advisory |
https://go.dev/cl/269658 | Patch Vendor Advisory |
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292 | Mailing List Patch |
https://go.dev/issue/42559 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-11-18 09:15
Updated : 2023-02-28 06:52
NVD link : CVE-2020-28366
Mitre link : CVE-2020-28366
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
golang
- go
netapp
- cloud_insights_telegraf_agent
- trident
fedoraproject
- fedora