Open mend-bolt-for-github[bot] opened 3 years ago
github.com/Microsoft/hcsshim-v0.8.7
Windows - Host Compute Service Shim
Library home page: https://proxy.golang.org/github.com/microsoft/hcsshim/@v/v0.8.7.zip
Dependency Hierarchy: - :x: **github.com/Microsoft/hcsshim-v0.8.7** (Vulnerable Library)
Distributed reliable key-value store for the most critical data of a distributed system
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd-v3.4.3** (Vulnerable Library)
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20191101175033-0deb6923b6d9.zip
Dependency Hierarchy: - :x: **github.com/golang/net-v0.0.0-20191101175033-0deb6923b6d9** (Vulnerable Library)
Dependency Hierarchy: - github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/mock (Root Library) - github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/meta - google.golang.org/api/compute/v1-v0.6.1-0.20190607001116-5213b8090861 - google.golang.org/api/option-v0.6.1-0.20190607001116-5213b8090861 - github.com/grpc/grpc-go-v1.23.1 - github.com/grpc/grpc-go-v1.23.1 - github.com/golang/net/http2-0deb6923b6d97481cb43bc1043fe5b72a0143032 - :x: **github.com/golang/net/http/httpguts-0deb6923b6d97481cb43bc1043fe5b72a0143032** (Vulnerable Library)
Found in base branch: master
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
Publish Date: 2021-05-27
URL: CVE-2021-31525
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1958341
Release Date: 2021-05-27
Fix Resolution: golang - v1.15.12,v1.16.4,v1.17.0
Step up your Open Source Security Game with Mend here
CVE-2021-31525 - Medium Severity Vulnerability
Vulnerable Libraries - github.com/Microsoft/hcsshim-v0.8.7, github.com/etcd-io/etcd-v3.4.3, github.com/golang/net-v0.0.0-20191101175033-0deb6923b6d9, github.com/golang/net/http/httpguts-0deb6923b6d97481cb43bc1043fe5b72a0143032
github.com/Microsoft/hcsshim-v0.8.7
Windows - Host Compute Service Shim
Library home page: https://proxy.golang.org/github.com/microsoft/hcsshim/@v/v0.8.7.zip
Dependency Hierarchy: - :x: **github.com/Microsoft/hcsshim-v0.8.7** (Vulnerable Library)
github.com/etcd-io/etcd-v3.4.3
Distributed reliable key-value store for the most critical data of a distributed system
Dependency Hierarchy: - :x: **github.com/etcd-io/etcd-v3.4.3** (Vulnerable Library)
github.com/golang/net-v0.0.0-20191101175033-0deb6923b6d9
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20191101175033-0deb6923b6d9.zip
Dependency Hierarchy: - :x: **github.com/golang/net-v0.0.0-20191101175033-0deb6923b6d9** (Vulnerable Library)
github.com/golang/net/http/httpguts-0deb6923b6d97481cb43bc1043fe5b72a0143032
[mirror] Go supplementary network libraries
Dependency Hierarchy: - github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/mock (Root Library) - github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/meta - google.golang.org/api/compute/v1-v0.6.1-0.20190607001116-5213b8090861 - google.golang.org/api/option-v0.6.1-0.20190607001116-5213b8090861 - github.com/grpc/grpc-go-v1.23.1 - github.com/grpc/grpc-go-v1.23.1 - github.com/golang/net/http2-0deb6923b6d97481cb43bc1043fe5b72a0143032 - :x: **github.com/golang/net/http/httpguts-0deb6923b6d97481cb43bc1043fe5b72a0143032** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
Publish Date: 2021-05-27
URL: CVE-2021-31525
CVSS 3 Score Details (5.9)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1958341
Release Date: 2021-05-27
Fix Resolution: golang - v1.15.12,v1.16.4,v1.17.0
Step up your Open Source Security Game with Mend here