CVE-2020-28366

Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:21

Type Values Removed Values Added
References (CONFIRM) https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM - Mailing List, Release Notes, Third Party Advisory () https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM -
References (MISC) https://pkg.go.dev/vuln/GO-2022-0475 - Vendor Advisory () https://pkg.go.dev/vuln/GO-2022-0475 -
References (MISC) https://go.dev/issue/42559 - Issue Tracking, Patch, Vendor Advisory () https://go.dev/issue/42559 -
References (MISC) https://go.dev/cl/269658 - Patch, Vendor Advisory () https://go.dev/cl/269658 -
References (MISC) https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292 - Mailing List, Patch () https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292 -

Information

Published : 2020-11-18 17:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-28366

Mitre link : CVE-2020-28366

CVE.ORG link : CVE-2020-28366


JSON object : View

Products Affected

fedoraproject

  • fedora

netapp

  • trident
  • cloud_insights_telegraf_agent

golang

  • go
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')