Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://groups.google.com/g/golang-announce/c/mperVMGa98w | third party advisory release notes |
https://blog.golang.org/path-security | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20210219-0001/ | third party advisory |
https://security.gentoo.org/glsa/202208-02 | third party advisory vendor advisory |