First published: Thu Oct 14 2021(Updated: )
An out of bounds read vulnerability was found in debug/macho of the Go standard library. When using the debug/macho standard library (stdlib) and malformed binaries are parsed using Open or OpenFat, it can cause golang to attempt to read outside of a slice (array) causing a panic when calling ImportedSymbols. An attacker can use this vulnerability to craft a file which causes an application using this library to crash resulting in a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.1.0-2.el8 | 0:1.1.0-2.el8 |
Golang Go | <1.16.10 | |
Golang Go | >=1.17.0<1.17.3 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
redhat/go | <1.16.10 | 1.16.10 |
redhat/go | <1.17.3 | 1.17.3 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
<1.16.10 | ||
>=1.17.0<1.17.3 | ||
=34 | ||
=35 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this vulnerability is CVE-2021-41771.
The severity level of CVE-2021-41771 is high.
Software versions before 1.16.10 and 1.17.x before 1.17.3 of Go are affected by CVE-2021-41771.
To fix CVE-2021-41771, update to version 1.16.10 or later for Go 1.16 and update to version 1.17.3 or later for Go 1.17.
Yes, you can find references for CVE-2021-41771 at the following links: [Link 1](https://github.com/golang/go/issues/48990), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2020726), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2020728).