SB2018032115 - Fedora EPEL 6 update for golang



SB2018032115 - Fedora EPEL 6 update for golang

Published: March 21, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018032115
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) OS command execution (CVE-ID: CVE-2018-7187)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The weakness exists in the "go get" implementation due to insufficient validation of the import path (get/vcs.go only checks for "://" anywhere in the string) when the -insecure command-line option is used. A remote attacker can trick the victim into visiting a specially crafted website, inject OS commands and execute arbitrary code.

2) Command injection (CVE-ID: CVE-2018-6574)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The weakness exists due to "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked. A remote attacker can execute arbitrary commands.

Remediation

Install update from vendor's website.