First published: Tue May 18 2021(Updated: )
A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.23.2-1.el8 | 0:0.23.2-1.el8 |
redhat/go-toolset | <1.15-golang-0:1.15.14-2.el7_9 | 1.15-golang-0:1.15.14-2.el7_9 |
redhat/grafana | <0:7.5.9-4.el8 | 0:7.5.9-4.el8 |
redhat/buildah | <1:1.27.0-2.el9 | 1:1.27.0-2.el9 |
redhat/ignition | <0:2.6.0-8.rhaos4.6.git947598e.el8 | 0:2.6.0-8.rhaos4.6.git947598e.el8 |
redhat/atomic-openshift-service-idler | <0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8 | 0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8 |
redhat/cri-o | <0:1.20.4-7.rhaos4.7.git6287500.el7 | 0:1.20.4-7.rhaos4.7.git6287500.el7 |
redhat/ignition | <0:2.9.0-4.rhaos4.7.git1d56dc8.el8 | 0:2.9.0-4.rhaos4.7.git1d56dc8.el8 |
redhat/openshift | <0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7 | 0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7 |
redhat/openshift-clients | <0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8 | 0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8 |
redhat/redhat-release-coreos | <0:47.84-1.el8 | 0:47.84-1.el8 |
redhat/cri-o | <0:1.21.2-8.rhaos4.8.git8d4264e.el7 | 0:1.21.2-8.rhaos4.8.git8d4264e.el7 |
redhat/ignition | <0:2.9.0-7.rhaos4.8.el8 | 0:2.9.0-7.rhaos4.8.el8 |
redhat/openshift | <0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7 | 0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7 |
redhat/openshift-clients | <0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 | 0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 |
redhat/containernetworking-plugins | <0:0.8.6-3.rhaos4.6.el7 | 0:0.8.6-3.rhaos4.6.el7 |
redhat/cri-tools | <0:1.21.0-3.el8 | 0:1.21.0-3.el8 |
redhat/golang-github-prometheus-promu | <0:0.5.0-4.git642a960.el8 | 0:0.5.0-4.git642a960.el8 |
redhat/butane | <0:0.12.1-2.rhaos4.8.el8 | 0:0.12.1-2.rhaos4.8.el8 |
redhat/mcg | <0:5.9.0-28.61dcf87.5.9.el8 | 0:5.9.0-28.61dcf87.5.9.el8 |
redhat/etcd | <0:3.3.23-3.1.el8 | 0:3.3.23-3.1.el8 |
redhat/kubevirt | <0:2.6.10-230.el7 | 0:2.6.10-230.el7 |
redhat/kubevirt | <0:4.8.5-278.el7 | 0:4.8.5-278.el7 |
redhat/kubevirt | <0:2.6.10-230.el8 | 0:2.6.10-230.el8 |
redhat/kubevirt | <0:4.8.5-278.el8 | 0:4.8.5-278.el8 |
Golang Go | <1.15.13 | |
Golang Go | >=1.16.0<1.16.5 | |
Netapp Cloud Insights Telegraf Agent | ||
redhat/go | <1.16.5 | 1.16.5 |
redhat/go | <1.15.13 | 1.15.13 |
IBM Security Guardium Insights | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33195 is a vulnerability in Go before 1.15.13 and 1.16.x before 1.16.5 that could allow a remote attacker to execute arbitrary code on the system.
CVE-2021-33195 has a severity rating of 7.5 (High).
The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in net are affected by CVE-2021-33195.
You can fix CVE-2021-33195 by updating to Go version 1.15.13 or 1.16.5.
You can find more information about CVE-2021-33195 in the following references: [link1](https://github.com/golang/go/issues/46241), [link2](https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1989568).