First published: Sun Aug 08 2021(Updated: )
Golang Go is vulnerable to a denial of service, caused by a race condition upon an ErrAbortHandler abort. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a net/http/httputil ReverseProxy panic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/go | <1.16.7 | 1.16.7 |
redhat/go | <1.15.15 | 1.15.15 |
Golang Go | <1.15.15 | |
Golang Go | >=1.16.0<1.16.7 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Oracle TimesTen In-Memory Database | <21.1.1.1.0 | |
Siemens Scalance Lpe9403 Firmware | <2.0 | |
Siemens Scalance Lpe9403 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36221 is a vulnerability in Golang Go that can lead to a denial of service by exploiting a race condition in net/http/httputil ReverseProxy.
CVE-2021-36221 can be exploited by a remote attacker to cause a panic in net/http/httputil ReverseProxy, resulting in a denial of service.
The severity of CVE-2021-36221 is rated as high with a CVSS score of 7.5.
Golang Go versions 1.15.15 and 1.16.0 to 1.16.7 are affected by CVE-2021-36221.
To fix CVE-2021-36221, update Golang Go to version 1.15.15 or 1.16.7.