Name | CVE-2020-7919 |
Description | Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | high |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
golang-1.11 (PTS) | buster, buster (security) | 1.11.6-1+deb10u3 | vulnerable |
golang-1.7 (PTS) | stretch | 1.7.4-2+deb9u1 | fixed |
| stretch (security) | 1.7.4-2+deb9u2 | fixed |
golang-1.8 (PTS) | stretch | 1.8.1-1+deb9u1 | fixed |
| stretch (security) | 1.8.1-1+deb9u2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[buster] - golang-1.11 <postponed> (Minor issue, can be fixed along in next DSA)
[stretch] - golang-1.8 <not-affected> (cryptobyte stuff introduced in golang-1.10)
[stretch] - golang-1.7 <not-affected> (cryptobyte stuff introduced in golang-1.10)
https://github.com/golang/go/issues/36837
https://github.com/golang/go/commit/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574 (master)
https://github.com/golang/go/issues/36838 (Go 1.13)
https://github.com/golang/go/commit/f938e06d0623d0e1de202575d16f1e126741f6e0 (go1.13.7)