The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2021-07-15 07:15
Updated : 2022-08-04 13:00
NVD link : CVE-2021-34558
Mitre link : CVE-2021-34558
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
netapp
- trident
- storagegrid
- cloud_insights_telegraf
fedoraproject
- fedora
golang
- go
oracle
- timesten_in-memory_database