cvelist/2021/3xxx/CVE-2021-3115.json

82 lines
2.7 KiB
JSON
Raw Normal View History

2021-01-11 05:01:48 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-01-26 18:07:03 +00:00
"ID": "CVE-2021-3115",
"STATE": "PUBLIC"
2021-01-11 05:01:48 +00:00
},
2021-01-26 18:07:03 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-01-11 05:01:48 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-01-26 18:07:03 +00:00
"value": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
},
{
"refsource": "CONFIRM",
"name": "https://blog.golang.org/path-security",
"url": "https://blog.golang.org/path-security"
2021-02-06 03:00:49 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-e435a8bb88",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/"
2021-02-19 13:00:47 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0001/"
2022-08-04 16:00:49 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202208-02",
"url": "https://security.gentoo.org/glsa/202208-02"
2021-01-11 05:01:48 +00:00
}
]
}
}