DEBIAN-CVE-2020-15216

Source
https://security-tracker.debian.org/tracker/CVE-2020-15216
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-15216.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-15216
Upstream
Published
2020-09-29T16:15:11Z
Modified
2025-10-25T18:13:57.560055Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0

References

Affected packages

Debian:11

golang-github-russellhaering-goxmldsig

Package

Name
golang-github-russellhaering-goxmldsig
Purl
pkg:deb/debian/golang-github-russellhaering-goxmldsig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12

golang-github-russellhaering-goxmldsig

Package

Name
golang-github-russellhaering-goxmldsig
Purl
pkg:deb/debian/golang-github-russellhaering-goxmldsig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14

golang-github-russellhaering-goxmldsig

Package

Name
golang-github-russellhaering-goxmldsig
Purl
pkg:deb/debian/golang-github-russellhaering-goxmldsig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-1

Affected versions

0.*

0.0~git20170911.b7efc62-1
0.0~git20180430.7acd5e4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}