First published: Wed Jan 20 2021(Updated: )
A flaw was found in golang: cmd/go, in which Go can execute arbitrary commands at build time when cgo is in use on Windows OS. On Linux/Unix, only users who have "." listed explicitly in their PATH variable are affected. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.20.0-6.el8 | 0:0.20.0-6.el8 |
redhat/openshift-serverless-clients | <0:0.20.0-7.el8 | 0:0.20.0-7.el8 |
Golang Go | <1.14.14 | |
Golang Go | >=1.15<1.15.7 | |
Microsoft Windows | ||
Fedoraproject Fedora | =33 | |
Netapp Cloud Insights Telegraf Agent | ||
Netapp Storagegrid |
The flaw can be mitigated by making sure "." is not in your PATH environment variable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3115 is a vulnerability in Go programming language on Windows OS that allows for command injection and remote code execution.
The severity level of CVE-2021-3115 is high, with a CVSS score of 7.5.
Go versions before 1.14.14 and 1.15.x before 1.15.7 on Windows OS are affected by CVE-2021-3115.
To fix CVE-2021-3115, update your Go installations to version 1.14.14 or 1.15.7.
No, Microsoft Windows is not vulnerable to CVE-2021-3115.