github.com/golang/go is vulnerable to arbitrary code execution attacks. The application does not filter the compiler flag variables -fplugin=
and -plugin=
when the go get
command is run, allowing a malicious user to inject and execute arbitrary code by loading compiler plugins.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | eq | HEAD | |
github.com/golang/go | le | 1.8.6 | |
github.com/golang/go | le | 1.10rc1 | |
github.com/golang/go | le | 1.9.3 |
access.redhat.com/errata/RHSA-2018:0878
access.redhat.com/errata/RHSA-2018:1304
github.com/golang/go/issues/23672
github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574
groups.google.com/forum/#!topic/golang-nuts/Gbhh1NxAjMU
groups.google.com/forum/#!topic/golang-nuts/sprOaQ5m3Dk
www.debian.org/security/2019/dsa-4380