漏洞信息详情
Google Golang 安全漏洞
- CNNVD编号:CNNVD-202207-2644
- 危害等级: 高危
- CVE编号: CVE-2022-30631
- 漏洞类型: 其他
- 发布时间: 2022-07-28
- 威胁类型: 远程
- 更新时间: 2022-09-27
- 厂 商:
- 漏洞来源:
漏洞简介
Google Golang是美国谷歌(Google)公司的一种静态强类型、编译型语言。Go的语法接近C语言,但对于变量的声明有所不同。Go支持垃圾回收功能。Go的并行模型是以东尼·霍尔的通信顺序进程(CSP)为基础,采取类似模型的其他语言包括Occam和Limbo,但它也具有Pi运算的特征,比如通道传输。在1.8版本中开放插件(Plugin)的支持,这意味着现在能从Go中动态加载部分函数。
Google Golang 存在安全漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://go.dev/
参考网址
来源:MISC
链接:https://pkg.go.dev/vuln/GO-2022-0524
来源:MISC
链接:https://go.dev/cl/417067
来源:MISC
链接:https://go.dev/issue/53168
来源:MISC
链接:https://go.Googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e
来源:MISC
链接:https://groups.Google.com/g/golang-announce/c/nqrv9fbR0zE
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168053/Red-Hat-Security-Advisory-2022-6042-01.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168111/Red-Hat-Security-Advisory-2022-6113-01.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168182/Red-Hat-Security-Advisory-2022-6184-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.3919
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4150
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4055
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168230/Red-Hat-Security-Advisory-2022-6152-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4233
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168007/Red-Hat-Security-Advisory-2022-5875-01.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168088/Red-Hat-Security-Advisory-2022-6061-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4598
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168503/Red-Hat-Security-Advisory-2022-6560-01.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/167946/Red-Hat-Security-Advisory-2022-5866-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.3887
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.3822
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.3988
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168322/Red-Hat-Security-Advisory-2022-6262-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4757
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Go-denial-of-service-via-compress-gzip-Reader-Read-38939
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168187/Red-Hat-Security-Advisory-2022-6188-01.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168284/Red-Hat-Security-Advisory-2022-6183-01.HTML
来源:cxsecurity.com
链接:https://cxsecurity.com/cveshow/CVE-2022-30631/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168136/Red-Hat-Security-Advisory-2022-6053-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4123
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4167
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4324
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.4568
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/168387/Red-Hat-Security-Advisory-2022-6517-01.HTML
受影响实体
暂无
补丁
暂无
评论