| id: GO-2021-0068 |
| modules: |
| - module: cmd |
| versions: |
| - fixed: 1.14.14 |
| - introduced: 1.15.0-0 |
| - fixed: 1.15.7 |
| vulnerable_at: 1.15.6 |
| packages: |
| - package: cmd/go |
| goos: |
| - windows |
| skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' |
| summary: Arbitrary code injection via the go command with cgo on Windows in cmd/go |
| description: |- |
| The go command may execute arbitrary code at build time when using cgo on |
| Windows. This can be triggered by running go get on a malicious module, or any |
| other time the code is built. |
| published: 2021-04-14T20:04:52Z |
| cves: |
| - CVE-2021-3115 |
| credits: |
| - RyotaK |
| references: |
| - fix: https://go.dev/cl/284783 |
| - fix: https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0 |
| - report: https://go.dev/issue/43783 |
| - web: https://groups.google.com/g/golang-announce/c/mperVMGa98w/m/yo5W5wnvAAAJ |
| - fix: https://go.dev/cl/284780 |
| - fix: https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0 |
| review_status: REVIEWED |