CVE-2020-15216

NameCVE-2020-15216
DescriptionIn goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs971615

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-russellhaering-goxmldsig (PTS)buster0.0~git20170911.b7efc62-1+deb10u1vulnerable
bullseye1.1.0-1+deb11u1fixed
sid, trixie, bookworm1.2.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-russellhaering-goxmldsigsource(unstable)1.1.0-1971615

Notes

[buster] - golang-github-russellhaering-goxmldsig <postponed> (Limited support, minor issue, no build rdeps)
https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64

Search for package or bug name: Reporting problems