git: ea4ec27ac98d - main - security/vuxml: Document lang/go vulnerability
Dmitri Goutnik
dmgk at FreeBSD.org
Tue Jul 13 12:02:10 UTC 2021
The branch main has been updated by dmgk:
URL: https://cgit.FreeBSD.org/ports/commit/?id=ea4ec27ac98d25b0d077fba948a1e900da3f606d
commit ea4ec27ac98d25b0d077fba948a1e900da3f606d
Author: Dmitri Goutnik <dmgk at FreeBSD.org>
AuthorDate: 2021-07-13 12:00:55 +0000
Commit: Dmitri Goutnik <dmgk at FreeBSD.org>
CommitDate: 2021-07-13 12:01:52 +0000
security/vuxml: Document lang/go vulnerability
---
security/vuxml/vuln-2021.xml | 35 +++++++++++++++++++++++++++++++++++
1 file changed, 35 insertions(+)
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 6b3c968fe90e..c30f6e3a6eb5 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,38 @@
+ <vuln vid="c365536d-e3cf-11eb-9d8d-b37b683944c2">
+ <topic>go -- crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters</topic>
+ <affects>
+ <package>
+ <name>go</name>
+ <range><lt>1.16.6,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Go project reports:</p>
+ <blockquote cite="https://github.com/golang/go/issues/47143">
+ <p>crypto/tls clients can panic when provided a certificate of
+ the wrong type for the negotiated parameters. net/http clients
+ performing HTTPS requests are also affected. The panic can be
+ triggered by an attacker in a privileged network position
+ without access to the server certificate's private key, as
+ long as a trusted ECDSA or Ed25519 certificate for the server
+ exists (or can be issued), or the client is configured with
+ Config.InsecureSkipVerify. Clients that disable all TLS_RSA
+ cipher suites (that is, TLS 1.0–1.2 cipher suites without
+ ECDHE), as well as TLS 1.3-only clients, are unaffected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-34558</cvename>
+ <url>https://github.com/golang/go/issues/47143</url>
+ </references>
+ <dates>
+ <discovery>2021-07-07</discovery>
+ <entry>2021-07-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9b1699ff-d84c-11eb-92d6-1b6ff3dfe4d3">
<topic>mantis -- multiple vulnerabilities</topic>
<affects>
More information about the dev-commits-ports-all
mailing list