CVE-2021-33194 (High) detected in github.com/golang/net-v0.0.0-20200301022130-244492dfa37a, github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b - autoclosed #7
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-33194 - High Severity Vulnerability
Vulnerable Libraries - github.com/golang/net-v0.0.0-20200301022130-244492dfa37a, github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b
github.com/golang/net-v0.0.0-20200301022130-244492dfa37a
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip
Path to dependency file: /examples/load-reporting-service/go.mod
Path to vulnerable library: /examples/load-reporting-service/go.mod
Dependency Hierarchy:
github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip
Path to dependency file: /examples/ext_authz/auth/grpc-service/go.mod
Path to vulnerable library: /examples/ext_authz/auth/grpc-service/go.mod
Dependency Hierarchy:
Found in HEAD commit: d853fd7abd23b213e8ecb1eded4fd77944aa8ed5
Found in base branch: main
Vulnerability Details
golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input.
Publish Date: 2021-05-26
URL: CVE-2021-33194
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33194
Release Date: 2021-05-26
Fix Resolution: golang.org/x/net - v0.0.0-20210520170846-37e1c6afe023
The text was updated successfully, but these errors were encountered: