Improper Input Validation Affecting golang-src package, versions <0:1.14.12-1.module+el8.3.0+8784+380394dc
Threat Intelligence
EPSS
1.04% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-GOLANGSRC-2086137
- published 26 Jul 2021
- disclosed 12 Nov 2020
Introduced: 12 Nov 2020
CVE-2020-28366 Open this link in a new tabHow to fix?
Upgrade Centos:8
golang-src
to version 0:1.14.12-1.module+el8.3.0+8784+380394dc or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream golang-src
package and not the golang-src
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28366
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42559
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://go.dev/cl/269658
- https://go.dev/issue/42559
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://pkg.go.dev/vuln/GO-2022-0475
CVSS Scores
version 3.1