CVE-2021-44717
golang: syscall: don't close fd 0 on ForkExec error
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
Go versiones anteriores a 1.16.12 y versiones 1.17.x anteriores a 1.17.5 en UNIX, permite operaciones de escritura en un archivo no deseado o en una conexión de red no deseada como consecuencia de un cierre erróneo del descriptor de archivo 0 tras el agotamiento del descriptor de archivo.
There's a flaw in golang's syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.3. Issues addressed include bypass, cross site request forgery, denial of service, and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-07 CVE Reserved
- 2021-12-16 CVE Published
- 2024-08-04 CVE Updated
- 2025-05-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-404: Improper Resource Shutdown or Release
CAPEC
References (8)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://groups.google.com/g/golang-announce/c/hcmEScgc00k | 2023-08-08 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202208-02 | 2023-08-08 | |
https://access.redhat.com/security/cve/CVE-2021-44717 | 2023-01-25 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2030806 | 2023-01-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.16.12 Search vendor "Golang" for product "Go" and version " < 1.16.12" | - |
Affected
| in | Opengroup Search vendor "Opengroup" | Unix Search vendor "Opengroup" for product "Unix" | - | - |
Safe
|
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | >= 1.17.0 < 1.17.5 Search vendor "Golang" for product "Go" and version " >= 1.17.0 < 1.17.5" | - |
Affected
| in | Opengroup Search vendor "Opengroup" | Unix Search vendor "Opengroup" for product "Unix" | - | - |
Safe
|
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|