Описание
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
golang-1.16 | fixed | 1.16.6-1 | package | |
golang-1.15 | fixed | 1.15.9-6 | package | |
golang-1.11 | removed | package | ||
golang-1.11 | postponed | buster | package | |
golang-1.8 | removed | package | ||
golang-1.8 | postponed | stretch | package | |
golang-1.7 | removed | package | ||
golang-1.7 | postponed | stretch | package |
Примечания
https://github.com/golang/go/issues/47143
https://github.com/golang/go/commit/58bc454a11d4b3dbc03f44dfcabb9068a9c076f4 (1.16.x)
key_agreement.go also bundled in various other packages
EPSS
Связанные уязвимости
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
EPSS