Vulnerability Report: GO-2022-0475
standard library- CVE-2020-28366
- Affects: cmd/go, cmd/cgo
- Published: Jul 28, 2022
- Modified: May 20, 2024
The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code. This can be caused by malicious unquoted symbol name in a linked object file.
Affected Packages
-
PathGo VersionsSymbols
-
before go1.14.12, from go1.15.0-0 before go1.15.5
1 unexported affected symbols
- Builder.cgo
-
before go1.14.12, from go1.15.0-0 before go1.15.5
1 unexported affected symbols
- dynimport
Aliases
References
- https://go.dev/cl/269658
- https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- https://go.dev/issue/42559
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
- https://vuln.go.dev/ID/GO-2022-0475.json
Credits
- Chris Brown (Tempus Ex)
Feedback
See anything missing or incorrect?
Suggest an edit to this report.