| Copyright 2024 The Go Authors. All rights reserved. |
| Use of this source code is governed by a BSD-style |
| license that can be found in the LICENSE file. |
| |
| Expected output of TestCVEToReport/CVE-2021-3115. |
| |
| -- CVE-2021-3115 -- |
| id: PLACEHOLDER-ID |
| modules: |
| - module: std |
| packages: |
| - package: cmd/go |
| summary: CVE-2021-3115 in cmd/go |
| description: |- |
| Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command |
| Injection and remote code execution when using the "go get" command to fetch |
| modules that make use of cgo (for example, cgo can execute a gcc program from an |
| untrusted download). |
| cves: |
| - CVE-2021-3115 |
| references: |
| - web: https://groups.google.com/g/golang-announce/c/mperVMGa98w |
| - web: https://blog.go.dev/path-security |
| - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/ |
| - web: https://security.netapp.com/advisory/ntap-20210219-0001/ |
| - web: https://security.gentoo.org/glsa/202208-02 |
| source: |
| id: CVE-2021-3115 |