First published: Thu May 20 2021(Updated: )
A flaw was found in golang. An attacker can craft an input to ParseFragment within parse.go that would cause it to enter an infinite loop and never return. The greatest threat to the system is of availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/golang.org/x/net v0.0.0-20210520170846 | <37 | 37 |
go/golang.org/x/net | <0.0.0-20210520170846-37e1c6afe023 | 0.0.0-20210520170846-37e1c6afe023 |
Go Programming Language | <=1.15.12 | |
Go Programming Language | >=1.16.0<=1.16.4 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33194 has a high severity rating due to its impact on system availability.
To fix CVE-2021-33194, upgrade to golang.org/x/net version 0.0.0-20210520170846-37e1c6afe023 or later.
CVE-2021-33194 affects versions of Go and golang.org/x/net up to 1.15.12 and certain versions between 1.16.0 and 1.16.4.
CVE-2021-33194 is a denial of service vulnerability due to an infinite loop in the ParseFragment function.
Yes, CVE-2021-33194 can be exploited remotely by crafting specific inputs to the ParseFragment function.