A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate's private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0-1.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | golang | 2021-09-02 22:54 | ALAS-2021-1527 |
Amazon Linux 2 - Core | golang | 2021-08-04 20:32 | ALAS2-2021-1694 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
NVD | CVSSv2 | 2.6 | AV:N/AC:H/Au:N/C:N/I:N/A:P |
NVD | CVSSv3 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |