CVE-2020-7919: Improper Certificate Validation
(updated )
Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.
References
- github.com/advisories/GHSA-cjjc-xp8v-855w
- github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w
- go.dev/cl/216677
- go.dev/cl/216680
- go.dev/issue/36837
- go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574
- groups.google.com/forum/
- groups.google.com/forum/
- groups.google.com/forum/
- groups.google.com/g/golang-announce/c/Hsw4mHYc470
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/
- nvd.nist.gov/vuln/detail/CVE-2020-7919
- pkg.go.dev/vuln/GO-2022-0229
- security.netapp.com/advisory/ntap-20200327-0001/
- www.debian.org/security/2021/dsa-4848
- www.oracle.com/security-alerts/cpuApr2021.html
Detect and mitigate CVE-2020-7919 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →