Upstream information

CVE-2018-16874 at MITRE

Description

In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.1
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector Network
Access Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High

Note from the SUSE Security Team

This problem only affects the go commandline tool, but no programs built with go.

SUSE Bugzilla entries: 1118897 [RESOLVED / FIXED], 1118898 [RESOLVED / FIXED], 1118899 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE CaaS Platform 3.0
  • caasp-cli >= 3.0.0+20180515.git_r38_7843d12-3.3.1
  • cni-plugins >= 0.6.0-4.3.1
  • container-feeder >= 3.0.0+20181105.git_r90_c54fd18-3.9.1
  • containerd-kubic >= 0.2.9+gitr706_06b9cb351610-5.3.1
  • cri-o >= 1.10.6-4.11.1
  • cri-tools >= 1.0.0beta2-3.6.1
  • docker-kubic >= 17.09.1_ce-7.3.1
  • docker-libnetwork-kubic >= 0.7.0.1+gitr2066_7b2b1feb1de4-3.3.1
  • docker-runc-kubic >= 1.0.0rc4+gitr3338_3f2f8b84a77f-5.3.1
  • etcd >= 3.3.1-3.3.1
  • etcdctl >= 3.3.1-3.3.1
  • golang-github-docker-libnetwork-kubic >= 0.7.0.1+gitr2066_7b2b1feb1de4-3.3.1
  • helm >= 2.8.2-3.3.1
  • kubernetes >= 1.10.11-4.11.1
  • kubernetes-client >= 1.10.11-4.11.1
  • kubernetes-common >= 1.10.11-4.11.1
  • kubernetes-kubelet >= 1.10.11-4.11.1
  • kubernetes-master >= 1.10.11-4.11.1
  • kubernetes-node >= 1.10.11-4.11.1
  • libcontainers-storage >= 0+git26204-3.3.1
  • podman >= 0.8.5-3.6.1
  • runc >= 1.0.0~rc5-3.3.1
Patchnames:
SUSE-CAASP-3.0-2018-3026
SUSE Linux Enterprise Module for Containers 15
  • containerd >= 1.1.2-5.3.4
  • docker >= 18.06.1_ce-6.8.2
  • docker-bash-completion >= 18.06.1_ce-6.8.2
  • docker-libnetwork >= 0.7.0.1+gitr2664_3ac297bc7fd0-4.3.5
  • docker-runc >= 1.0.0rc5+gitr3562_69663f0bd4b6-6.3.4
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2664_3ac297bc7fd0-4.3.5
  • helm-mirror >= 0.2.1-1.7.1
Patchnames:
SUSE-SLE-Module-Containers-15-2018-3064
SUSE-SLE-Module-Containers-15-2019-286
SUSE-SLE-Module-Containers-15-2019-48
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
  • containerd >= 1.1.2-5.3.4
  • containerd-ctr >= 1.1.2-5.3.4
  • containerd-test >= 1.1.2-5.3.4
  • docker >= 18.06.1_ce-6.8.2
  • docker-runc >= 1.0.0rc5+gitr3562_69663f0bd4b6-6.3.4
  • docker-runc-test >= 1.0.0rc5+gitr3562_69663f0bd4b6-6.3.4
  • docker-test >= 18.06.1_ce-6.8.2
  • docker-zsh-completion >= 18.06.1_ce-6.8.2
  • go >= 1.10.4-3.6.2
  • go-doc >= 1.10.4-3.6.2
  • go1.10 >= 1.10.7-1.5.3
  • go1.10-doc >= 1.10.7-1.5.3
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2664_3ac297bc7fd0-4.3.5
  • golang-packaging >= 15.0.11-3.3.2
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-2018-3064
SUSE-SLE-Module-Development-Tools-OBS-15-2019-286
SUSE Package Hub for SUSE Linux Enterprise 15
  • runc >= 1.0.0~rc6-bp150.2.3.1
  • runc-test >= 1.0.0~rc6-bp150.2.3.1
Patchnames:
openSUSE-2019-170
openSUSE Leap 15.0
  • containerd >= 1.1.2-lp150.4.6.1
  • containerd-ctr >= 1.1.2-lp150.4.6.1
  • containerd-kubic >= 1.1.2-lp150.4.3.1
  • containerd-kubic-ctr >= 1.1.2-lp150.4.3.1
  • containerd-kubic-test >= 1.1.2-lp150.4.3.1
  • containerd-test >= 1.1.2-lp150.4.6.1
  • docker >= 18.09.0_ce-lp150.5.9.1
  • docker-bash-completion >= 18.09.0_ce-lp150.5.9.1
  • docker-debuginfo >= 18.09.0_ce-lp150.5.9.1
  • docker-debugsource >= 18.09.0_ce-lp150.5.9.1
  • docker-kubic >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-bash-completion >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-debuginfo >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-debugsource >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-test >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-test-debuginfo >= 18.06.1_ce-lp150.5.6.1
  • docker-kubic-zsh-completion >= 18.06.1_ce-lp150.5.6.1
  • docker-libnetwork >= 0.7.0.1+gitr2704_6da50d197830-lp150.3.6.1
  • docker-libnetwork-debuginfo >= 0.7.0.1+gitr2704_6da50d197830-lp150.3.6.1
  • docker-libnetwork-kubic >= 0.7.0.1+gitr2664_3ac297bc7fd0-lp150.3.3.1
  • docker-libnetwork-kubic-debuginfo >= 0.7.0.1+gitr2664_3ac297bc7fd0-lp150.3.3.1
  • docker-runc >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.6.1
  • docker-runc-debuginfo >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.6.1
  • docker-runc-kubic >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.3.1
  • docker-runc-kubic-debuginfo >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.3.1
  • docker-runc-kubic-test >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.3.1
  • docker-runc-test >= 1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.6.1
  • docker-test >= 18.09.0_ce-lp150.5.9.1
  • docker-test-debuginfo >= 18.09.0_ce-lp150.5.9.1
  • docker-zsh-completion >= 18.09.0_ce-lp150.5.9.1
  • go >= 1.10.4-lp150.2.7.1
  • go-doc >= 1.10.4-lp150.2.7.1
  • go-race >= 1.10.4-lp150.2.7.1
  • go1.10 >= 1.10.7-lp150.2.1
  • go1.10-doc >= 1.10.7-lp150.2.1
  • go1.10-race >= 1.10.7-lp150.2.1
  • go1.11 >= 1.11.4-lp150.2.1
  • go1.11-doc >= 1.11.4-lp150.2.1
  • go1.11-race >= 1.11.4-lp150.2.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2704_6da50d197830-lp150.3.6.1
  • golang-github-docker-libnetwork-kubic >= 0.7.0.1+gitr2664_3ac297bc7fd0-lp150.3.3.1
  • golang-packaging >= 15.0.11-lp150.2.3.1
  • runc >= 1.0.0~rc6-lp150.2.3.1
  • runc-debuginfo >= 1.0.0~rc6-lp150.2.3.1
  • runc-test >= 1.0.0~rc6-lp150.2.3.1
Patchnames:
openSUSE-2018-1572
openSUSE-2018-1626
openSUSE-2019-189
openSUSE-2019-208
openSUSE Leap 42.3
  • go1.10 >= 1.10.7-5.1
  • go1.10-doc >= 1.10.7-5.1
  • go1.10-race >= 1.10.7-5.1
  • go1.11 >= 1.11.4-2.1
  • go1.11-doc >= 1.11.4-2.1
  • go1.11-race >= 1.11.4-2.1
Patchnames:
openSUSE-2018-1572
openSUSE-2018-1593


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
CaaS Platform 2.0 docker Affected
OpenStack Cloud Magnum Orchestration 7.0 docker Already fixed
SUSE Linux Enterprise Module for Containers 12 docker Already fixed
SUSE Linux Enterprise Module for Containers 15 containerd Released
SUSE Linux Enterprise Module for Containers 15 docker Released
SUSE Openstack Cloud 6 docker Already fixed