blob: c089a64ae77a45c1945160bd6e2f90aeb9c0e1cf [file] [log] [blame]
id: GO-2022-0166
modules:
- module: std
versions:
- fixed: 1.5.4
- introduced: 1.6.0-0
fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: crypto/dsa
symbols:
- Verify
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Denial of service due to unchecked parameters in crypto/dsa
description: |-
The Verify function in crypto/dsa passed certain parameters unchecked to the
underlying big integer library, possibly leading to extremely long-running
computations, which in turn makes Go programs vulnerable to remote denial of
service attacks. Programs using HTTPS client certificates or the Go SSH server
libraries are both exposed to this vulnerability.
published: 2022-05-24T22:06:33Z
cves:
- CVE-2016-3959
credits:
- David Wong
references:
- fix: https://go.dev/cl/21533
- fix: https://go.googlesource.com/go/+/eb876dd83cb8413335d64e50aae5d38337d1ebb4
- report: https://go.dev/issue/15184
- web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck