Hi gophers,
We have just released Go 1.8.7, Go 1.9.4, and Go 1.10rc2, to address a recently-reported security issue. We recommend that all users update to one of these releases (if you’re not sure which, choose Go 1.9.4).
By using the clang or gcc plugin mechanism, it was possible for an attacker to trick the “go get” command into executing arbitrary code. The go command now restricts the set of allowed host compiler and linker arguments in cgo source files to a list of allowed flags, in particular disallowing -fplugin= and -plugin=.
Thanks to Christopher Brown of Mattermost for reporting this problem.
Cheers,
Andy (on behalf of the Go team)