[pkg-golang-devel] Bug#895663: golang-1.9: CVE-2018-7187: arbitrary command execution via VCS path

Salvatore Bonaccorso carnil at debian.org
Sat Apr 14 09:49:17 BST 2018


Source: golang-1.9
Version: 1.9.4-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/golang/go/issues/23867
Control: clone -1 -2 -3
Control: reassign -2 src:golang-1.8 1.8.1-1
Control: retitle -2 golang-1.8: CVE-2018-7187: arbitrary command execution via VCS path
Control: reassign -3 src:golang-1.7 1.7.4-2
Control: retitle -3 golang-1.7: CVE-2018-7187: arbitrary command execution via VCS path

Hi,

The following vulnerability was published for golang-1.9.

CVE-2018-7187[0]:
| The "go get" implementation in Go 1.9.4, when the -insecure
| command-line option is used, does not validate the import path
| (get/vcs.go only checks for "://" anywhere in the string), which allows
| remote attackers to execute arbitrary OS commands via a crafted web
| site.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-7187
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7187
[1] https://github.com/golang/go/issues/23867

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-golang-devel mailing list