First published: Fri May 21 2021(Updated: )
A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.23.2-1.el8 | 0:0.23.2-1.el8 |
redhat/go-toolset | <1.15-golang-0:1.15.14-2.el7_9 | 1.15-golang-0:1.15.14-2.el7_9 |
redhat/grafana | <0:7.5.9-4.el8 | 0:7.5.9-4.el8 |
redhat/podman | <2:4.2.0-3.el9 | 2:4.2.0-3.el9 |
redhat/buildah | <1:1.27.0-2.el9 | 1:1.27.0-2.el9 |
redhat/ignition | <0:2.6.0-8.rhaos4.6.git947598e.el8 | 0:2.6.0-8.rhaos4.6.git947598e.el8 |
redhat/atomic-openshift-service-idler | <0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8 | 0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8 |
redhat/cri-o | <0:1.20.4-7.rhaos4.7.git6287500.el7 | 0:1.20.4-7.rhaos4.7.git6287500.el7 |
redhat/ignition | <0:2.9.0-4.rhaos4.7.git1d56dc8.el8 | 0:2.9.0-4.rhaos4.7.git1d56dc8.el8 |
redhat/openshift | <0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7 | 0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7 |
redhat/openshift-clients | <0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8 | 0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8 |
redhat/redhat-release-coreos | <0:47.84-1.el8 | 0:47.84-1.el8 |
redhat/cri-o | <0:1.21.2-8.rhaos4.8.git8d4264e.el7 | 0:1.21.2-8.rhaos4.8.git8d4264e.el7 |
redhat/ignition | <0:2.9.0-7.rhaos4.8.el8 | 0:2.9.0-7.rhaos4.8.el8 |
redhat/openshift | <0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7 | 0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7 |
redhat/openshift-clients | <0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 | 0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7 |
redhat/containernetworking-plugins | <0:0.8.6-3.rhaos4.6.el7 | 0:0.8.6-3.rhaos4.6.el7 |
redhat/cri-tools | <0:1.21.0-3.el8 | 0:1.21.0-3.el8 |
redhat/golang-github-prometheus-promu | <0:0.5.0-4.git642a960.el8 | 0:0.5.0-4.git642a960.el8 |
redhat/butane | <0:0.12.1-2.rhaos4.8.el8 | 0:0.12.1-2.rhaos4.8.el8 |
redhat/mcg | <0:5.9.0-28.61dcf87.5.9.el8 | 0:5.9.0-28.61dcf87.5.9.el8 |
redhat/etcd | <0:3.3.23-3.1.el8 | 0:3.3.23-3.1.el8 |
redhat/kubevirt | <0:2.6.10-230.el7 | 0:2.6.10-230.el7 |
redhat/kubevirt | <0:4.8.5-278.el7 | 0:4.8.5-278.el7 |
redhat/kubevirt | <0:2.6.10-230.el8 | 0:2.6.10-230.el8 |
redhat/kubevirt | <0:4.8.5-278.el8 | 0:4.8.5-278.el8 |
Golang Go | <1.15.13 | |
Golang Go | >=1.16.0<1.16.5 | |
redhat/go | <1.16.5 | 1.16.5 |
redhat/go | <1.15.13 | 1.15.13 |
IBM Security Guardium Insights | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33197 is a vulnerability in Go that allows a remote attacker to bypass security restrictions.
CVE-2021-33197 affects Golang Go versions before 1.15.13 and 1.16.x before 1.16.5.
CVE-2021-33197 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2021-33197 by sending a specially-crafted request to drop arbitrary headers.
To fix CVE-2021-33197, update your Golang Go installation to version 1.15.13 or 1.16.5.