Public Date:
1543561: CVE-2018-6574 golang: arbitrary code execution during "go get" via C compiler options
An arbitrary command execution flaw was found in the way Go's "go get" command handled gcc and clang sensitive options during the build. A remote attacker capable of hosting malicious repositories could potentially use this flaw to cause arbitrary command execution on the client side.

Find out more about CVE-2018-6574 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue affects the versions of golang as shipped with Red Hat OpenShift Enterprise 3. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification:

CVSS v3 metrics

CVSS3 Base Score 5.8
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction Required
Scope Changed
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) (go-toolset-7) RHSA-2018:1304 2018-05-03
Red Hat Enterprise Linux 7 (golang) RHSA-2018:0878 2018-04-10

Affected Packages State

Platform Package State
Red Hat OpenStack Platform Operational Tools 9 golang Will not fix
Red Hat OpenShift Enterprise 3 golang Will not fix
Red Hat Gluster Storage 3 golang Not affected
Red Hat Enterprise Linux OpenStack Platform 8.0 Operational Tools for RHEL 7 golang Will not fix
Red Hat Ceph Storage 3 golang Not affected
Red Hat Ceph Storage 2 golang Not affected
Last Modified