Source: golang-1.9
Version: 1.9.4-1
Severity: important
Tags: security upstream
Control: clone -1 -2 -3
Control: reassign -2 src:golang-1.8 1.8.1-1
Control: retitle -2 golang-1.8: CVE-2018-7187: arbitrary command execution via 
VCS path
Control: reassign -3 src:golang-1.7 1.7.4-2
Control: retitle -3 golang-1.7: CVE-2018-7187: arbitrary command execution via 
VCS path


The following vulnerability was published for golang-1.9.

| The "go get" implementation in Go 1.9.4, when the -insecure
| command-line option is used, does not validate the import path
| (get/vcs.go only checks for "://" anywhere in the string), which allows
| remote attackers to execute arbitrary OS commands via a crafted web
| site.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:


Please adjust the affected versions in the BTS as needed.


Reply via email to