| skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' |
| The Verify function in crypto/dsa passed certain parameters unchecked to |
| the underlying big integer library, possibly leading to extremely |
| long-running computations, which in turn makes Go programs vulnerable to |
| remote denial of service attacks. Programs using HTTPS client certificates |
| or the Go SSH server libraries are both exposed to this vulnerability. |
| published: 2022-05-24T22:06:33Z |
| - fix: https://go.dev/cl/21533 |
| - fix: https://go.googlesource.com/go/+/eb876dd83cb8413335d64e50aae5d38337d1ebb4 |
| - report: https://go.dev/issue/15184 |
| - web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck |