First published: Wed Feb 07 2018(Updated: )
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/golang | ||
debian/golang-1.10 | ||
debian/golang-1.7 | ||
redhat/go | <1.8.7 | 1.8.7 |
redhat/go | <1.9.4 | 1.9.4 |
redhat/go | <1.10 | 1.10 |
Ruby | <=1.8.6 | |
Ruby | =1.9 | |
Ruby | =1.9.1 | |
Ruby | =1.9.2 | |
Ruby | =1.9.3 | |
Ruby | =1.10-beta1 | |
Ruby | =1.10-beta2 | |
Ruby | =1.10-rc1 | |
Debian | =9.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6574 is classified as a high severity vulnerability due to its potential for remote command execution.
To mitigate CVE-2018-6574, upgrade to Go version 1.8.7, 1.9.4, or any version above 1.10.
CVE-2018-6574 allows attackers to execute arbitrary commands during the source code build process, compromising the security of affected systems.
CVE-2018-6574 affects Go versions prior to 1.8.7, 1.9.x before 1.9.4, and pre-release versions of Go 1.10.
Yes, CVE-2018-6574 affects Debian packages for Go that are below the fixed version thresholds.