The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-07-15 14:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34558
Mitre link : CVE-2021-34558
CVE.ORG link : CVE-2021-34558
JSON object : View
Products Affected
fedoraproject
- fedora
oracle
- timesten_in-memory_database
netapp
- trident
- storagegrid
- cloud_insights_telegraf
golang
- go
CWE
CWE-295
Improper Certificate Validation