First published: Thu Apr 22 2021(Updated: )
A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/heketi | <0:10.4.0-2.el7 | 0:10.4.0-2.el7 |
redhat/openshift-serverless-clients | <0:0.22.0-3.el8 | 0:0.22.0-3.el8 |
redhat/openshift-serverless-clients | <0:0.23.2-1.el8 | 0:0.23.2-1.el8 |
redhat/ignition | <0:2.9.0-4.rhaos4.7.git1d56dc8.el8 | 0:2.9.0-4.rhaos4.7.git1d56dc8.el8 |
redhat/cri-o | <0:1.21.2-8.rhaos4.8.git8d4264e.el8 | 0:1.21.2-8.rhaos4.8.git8d4264e.el8 |
redhat/ignition | <0:2.9.0-7.rhaos4.8.el8 | 0:2.9.0-7.rhaos4.8.el8 |
redhat/openshift | <0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8 | 0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8 |
redhat/openshift-clients | <0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 | 0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 |
redhat/containernetworking-plugins | <0:0.8.6-3.rhaos4.6.el7 | 0:0.8.6-3.rhaos4.6.el7 |
redhat/cri-tools | <0:1.21.0-3.el8 | 0:1.21.0-3.el8 |
redhat/golang-github-prometheus-promu | <0:0.5.0-4.git642a960.el8 | 0:0.5.0-4.git642a960.el8 |
redhat/etcd | <0:3.3.23-3.1.el8 | 0:3.3.23-3.1.el8 |
redhat/kubevirt | <0:4.9.0-287.el8 | 0:4.9.0-287.el8 |
go/golang.org/x/net | <0.0.0-20210428140749-89ef3d95e781 | 0.0.0-20210428140749-89ef3d95e781 |
redhat/golang | <1.17.0 | 1.17.0 |
redhat/golang | <1.16.4 | 1.16.4 |
redhat/golang | <1.15.12 | 1.15.12 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
Golang | <1.15.12 | |
Golang | >=1.16.0<1.16.4 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-31525 is a vulnerability in net/http of the Go standard library that allows remote attackers to cause a denial of service.
The vulnerability affects net/http in Go before 1.15.12 and 1.16.x before 1.16.4.
Servers written in Go are vulnerable to CVE-2021-31525 only if the value of MaxHeaderBytes has been increased, which is not the default configuration.
To fix CVE-2021-31525, upgrade to Go version 1.15.12 or 1.16.4.
More information about CVE-2021-31525 can be found on the NIST National Vulnerability Database (NVD) and the official Go GitHub page.