Your submission was sent successfully! Close

CVE-2021-33197

Published: 2 August 2021

In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.

Priority

Medium

CVSS 3 base score: 5.3

Status

Package Release Status
golang-1.11
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Ignored
(out of standard support)
golang-1.15
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish Ignored
(reached end-of-life)
trusty Does not exist

upstream
Released (1.15.9-5)
xenial Ignored
(out of standard support)
golang-1.16
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

groovy Does not exist

hirsute Ignored
(reached end-of-life)
impish Ignored
(reached end-of-life)
jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream
Released (1.16.5-1)
xenial Ignored
(out of standard support)
golang-1.7
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Ignored
(out of standard support)
golang-1.8
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Ignored
(out of standard support)