Source: golang-1.9 Version: 1.9.4-1 Severity: important Tags: security upstream Forwarded: https://github.com/golang/go/issues/23867 Control: clone -1 -2 -3 Control: reassign -2 src:golang-1.8 1.8.1-1 Control: retitle -2 golang-1.8: CVE-2018-7187: arbitrary command execution via VCS path Control: reassign -3 src:golang-1.7 1.7.4-2 Control: retitle -3 golang-1.7: CVE-2018-7187: arbitrary command execution via VCS path
Hi, The following vulnerability was published for golang-1.9. CVE-2018-7187[0]: | The "go get" implementation in Go 1.9.4, when the -insecure | command-line option is used, does not validate the import path | (get/vcs.go only checks for "://" anywhere in the string), which allows | remote attackers to execute arbitrary OS commands via a crafted web | site. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-7187 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7187 [1] https://github.com/golang/go/issues/23867 Please adjust the affected versions in the BTS as needed. Regards, Salvatore