Improper Input Validation The advisory has been revoked - it doesn't affect any version of package golang-src Open this link in a new tab
Threat Intelligence
EPSS
1.56% (88th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-GOLANGSRC-4414085
- published 26 Jul 2021
- disclosed 12 Nov 2020
Introduced: 12 Nov 2020
CVE-2020-28367 Open this link in a new tabAmendment
The Red Hat
security team deemed this advisory irrelevant for RHEL:7
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream golang-src
package and not the golang-src
package as distributed by RHEL
.
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.
References
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://security.netapp.com/advisory/ntap-20201202-0004/
- https://access.redhat.com/security/cve/CVE-2020-28367
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
- https://github.com/golang/go/issues/42556
- https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
- https://access.redhat.com/errata/RHSA-2020:5493
- https://security.gentoo.org/glsa/202208-02
- https://pkg.go.dev/vuln/GO-2022-0476
- https://go.dev/issue/42556
- https://go.dev/cl/267277
- https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html