vulnerability
SUSE: CVE-2018-7187: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Feb 16, 2018 | Jun 26, 2018 | Oct 22, 2021 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 16, 2018
Added
Jun 26, 2018
Modified
Oct 22, 2021
Description
The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.
Solutions
suse-upgrade-containerdsuse-upgrade-containerd-ctrsuse-upgrade-containerd-kubicsuse-upgrade-containerd-kubic-ctrsuse-upgrade-containerd-kubic-testsuse-upgrade-containerd-testsuse-upgrade-dockersuse-upgrade-docker-bash-completionsuse-upgrade-docker-kubicsuse-upgrade-docker-kubic-bash-completionsuse-upgrade-docker-kubic-testsuse-upgrade-docker-kubic-zsh-completionsuse-upgrade-docker-libnetworksuse-upgrade-docker-libnetwork-kubicsuse-upgrade-docker-runcsuse-upgrade-docker-runc-kubicsuse-upgrade-docker-runc-kubic-testsuse-upgrade-docker-runc-testsuse-upgrade-docker-testsuse-upgrade-docker-zsh-completionsuse-upgrade-gosuse-upgrade-go-docsuse-upgrade-go-racesuse-upgrade-go1-10suse-upgrade-go1-10-docsuse-upgrade-go1-10-racesuse-upgrade-go1-9suse-upgrade-go1-9-docsuse-upgrade-go1-9-racesuse-upgrade-golang-github-docker-libnetworksuse-upgrade-golang-github-docker-libnetwork-kubicsuse-upgrade-golang-packaging
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.