First published: Thu Apr 22 2021(Updated: )
A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/golang.org/x/net | <0.0.0-20210428140749-89ef3d95e781 | 0.0.0-20210428140749-89ef3d95e781 |
redhat/heketi | <0:10.4.0-2.el7 | 0:10.4.0-2.el7 |
redhat/openshift-serverless-clients | <0:0.22.0-3.el8 | 0:0.22.0-3.el8 |
redhat/openshift-serverless-clients | <0:0.23.2-1.el8 | 0:0.23.2-1.el8 |
redhat/ignition | <0:2.9.0-4.rhaos4.7.git1d56dc8.el8 | 0:2.9.0-4.rhaos4.7.git1d56dc8.el8 |
redhat/cri-o | <0:1.21.2-8.rhaos4.8.git8d4264e.el8 | 0:1.21.2-8.rhaos4.8.git8d4264e.el8 |
redhat/ignition | <0:2.9.0-7.rhaos4.8.el8 | 0:2.9.0-7.rhaos4.8.el8 |
redhat/openshift | <0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8 | 0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8 |
redhat/openshift-clients | <0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 | 0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 |
redhat/containernetworking-plugins | <0:0.8.6-3.rhaos4.6.el7 | 0:0.8.6-3.rhaos4.6.el7 |
redhat/cri-tools | <0:1.21.0-3.el8 | 0:1.21.0-3.el8 |
redhat/golang-github-prometheus-promu | <0:0.5.0-4.git642a960.el8 | 0:0.5.0-4.git642a960.el8 |
redhat/etcd | <0:3.3.23-3.1.el8 | 0:3.3.23-3.1.el8 |
redhat/kubevirt | <0:4.9.0-287.el8 | 0:4.9.0-287.el8 |
Golang Go | <1.15.12 | |
Golang Go | >=1.16.0<1.16.4 | |
Fedoraproject Fedora | =34 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
redhat/golang | <1.17.0 | 1.17.0 |
redhat/golang | <1.16.4 | 1.16.4 |
redhat/golang | <1.15.12 | 1.15.12 |
<1.15.12 | ||
>=1.16.0<1.16.4 | ||
=34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-31525 is a vulnerability in net/http of the Go standard library that allows remote attackers to cause a denial of service.
The vulnerability affects net/http in Go before 1.15.12 and 1.16.x before 1.16.4.
Servers written in Go are vulnerable to CVE-2021-31525 only if the value of MaxHeaderBytes has been increased, which is not the default configuration.
To fix CVE-2021-31525, upgrade to Go version 1.15.12 or 1.16.4.
More information about CVE-2021-31525 can be found on the NIST National Vulnerability Database (NVD) and the official Go GitHub page.