Unrated severityNVD Advisory· Published Aug 2, 2021· Updated Aug 3, 2024
CVE-2021-33195
CVE-2021-33195
Description
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
Affected products
24- Go/Godescription
- osv-coords23 versionspkg:bitnami/golangpkg:rpm/almalinux/buildahpkg:rpm/almalinux/buildah-testspkg:rpm/almalinux/delvepkg:rpm/almalinux/grafanapkg:rpm/opensuse/go1.15&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/go1.15&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/go1.15&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/go1.16&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/go1.16&distro=openSUSE%20Tumbleweedpkg:rpm/suse/go1.15&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/go1.15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/go1.15&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/go1.15&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/go1.15&distro=SUSE%20Manager%20Server%204.0pkg:rpm/suse/go1.16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/go1.16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3
< 1.15.13+ 22 more
- (no CPE)range: < 1.15.13
- (no CPE)range: < 1:1.27.0-2.el9
- (no CPE)range: < 1:1.27.0-2.el9
- (no CPE)range: < 1.6.0-1.module_el8.5.0+2604+960c7771
- (no CPE)range: < 7.5.9-4.el8
- (no CPE)range: < 1.15.13-lp152.20.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.15-1.2
- (no CPE)range: < 1.16.5-1.17.1
- (no CPE)range: < 1.16.8-1.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.15.13-1.33.1
- (no CPE)range: < 1.16.5-1.17.1
- (no CPE)range: < 1.16.5-1.17.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- security.gentoo.org/glsa/202208-02mitrevendor-advisoryx_refsource_GENTOO
- groups.google.com/g/golang-announcemitrex_refsource_MISC
- groups.google.com/g/golang-announce/c/RgCMkAEQjSImitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20210902-0005/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.