The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
References
Link | Resource |
---|---|
https://groups.google.com/forum/?pli=1#!topic/golang-announce/Kw31K8G7Fi0 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16875 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/106230 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201812-09 | Mitigation Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html |
Information
Published : 2018-12-14 06:29
Updated : 2019-06-03 11:29
NVD link : CVE-2018-16875
Mitre link : CVE-2018-16875
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
golang
- go
opensuse
- leap