First published: Thu Dec 09 2021(Updated: )
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.0.0-2.el8 | 0:1.0.0-2.el8 |
redhat/go-toolset | <1.16-0:1.16.12-1.el7_9 | 1.16-0:1.16.12-1.el7_9 |
redhat/go-toolset | <1.16-golang-0:1.16.12-1.el7_9 | 1.16-golang-0:1.16.12-1.el7_9 |
redhat/cri-o | <0:1.23.1-9.rhaos4.10.gitbdffb9a.el8 | 0:1.23.1-9.rhaos4.10.gitbdffb9a.el8 |
redhat/openshift | <0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el8 | 0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el8 |
redhat/openshift-clients | <0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el8 | 0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el8 |
redhat/containernetworking-plugins | <0:0.9.1-2.rhaos4.10.el8 | 0:0.9.1-2.rhaos4.10.el8 |
redhat/runc | <3:1.1.0-2.rhaos4.10.el8 | 3:1.1.0-2.rhaos4.10.el8 |
redhat/butane | <0:0.13.1-2.rhaos4.9.el8 | 0:0.13.1-2.rhaos4.9.el8 |
redhat/cri-tools | <0:1.22.0-2.el8 | 0:1.22.0-2.el8 |
redhat/ignition | <0:2.12.0-3.rhaos4.9.el8 | 0:2.12.0-3.rhaos4.9.el8 |
redhat/mcg | <0:5.10.0-72.el8 | 0:5.10.0-72.el8 |
redhat/kubevirt | <0:4.12.0-1057.el7 | 0:4.12.0-1057.el7 |
redhat/kubevirt | <0:4.12.0-1057.el8 | 0:4.12.0-1057.el8 |
Golang Go | <1.16.12 | |
Golang Go | >=1.17.0<1.17.5 | |
Opengroup Unix | ||
Debian Debian Linux | =9.0 | |
redhat/Go | <1.17.5 | 1.17.5 |
redhat/Go | <1.16.12 | 1.16.12 |
All of | ||
Any of | ||
Golang Go | <1.16.12 | |
Golang Go | >=1.17.0<1.17.5 | |
Opengroup Unix |
This bug can be mitigated by raising the per-process file descriptor limit.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-44717 is a vulnerability in Go before version 1.16.12 and 1.17.x before 1.17.5 on UNIX that allows write operations to an unintended file or program.
The severity of CVE-2021-44717 is medium with a CVSS score of 4.8.
Golang Go versions up to 1.16.12 and 1.17.0 to 1.17.5 on UNIX are affected by CVE-2021-44717.
An attacker can exploit CVE-2021-44717 by causing file descriptor exhaustion for the process and then repeatedly calling syscall.ForkExec().
No, Opengroup Unix and Debian Debian Linux are not vulnerable to CVE-2021-44717.
The recommended remedy for CVE-2021-44717 is to update to Go version 1.17.5 if you are using 1.17.x, or to update to Go version 1.16.12 if you are using 1.16.x.