Google Go 安全漏洞
CNNVD-ID编号 | CNNVD-202008-257 | CVE编号 | CVE-2020-16845 |
发布时间 | 2020-08-06 | 更新时间 | 2021-01-14 |
漏洞类型 | 其他 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。
Google Go 1.13.15之前版本和1.14.7之前的14.x版本中存在安全漏洞。攻击者可借助无效的输入利用该漏洞造成无限读取循环。
漏洞补丁
目前厂商已发布升级了Google Go 安全漏洞的补丁,Google Go 安全漏洞的补丁获取链接:
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
参考网址
来源:CONFIRM
链接:https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
来源:FEDORA
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
来源:FEDORA
来源:MISC
链接:https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200924-0002/
来源:www.ibm.com
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/49876
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159093/Red-Hat-Security-Advisory-2020-3665-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160905/Red-Hat-Security-Advisory-2021-0072-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4179/
来源:www.ibm.com
来源:www.ibm.com
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160580/Red-Hat-Security-Advisory-2020-5606-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4513/
来源:www.ibm.com
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-overload-via-ReadUvarint-33042
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159497/Red-Hat-Security-Advisory-2020-4201-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3699/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4136/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160206/Red-Hat-Security-Advisory-2020-5119-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160277/Red-Hat-Security-Advisory-2020-5159-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4297/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4461/
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3073/
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160664/Red-Hat-Security-Advisory-2020-5649-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4528/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3061/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-16845
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4229/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0102/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159725/Red-Hat-Security-Advisory-2020-4297-01.html
来源:www.ibm.com
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202008-257

评论