GO-2022-0229

Source
https://pkg.go.dev/vuln/GO-2022-0229
Import Source
https://vuln.go.dev/ID/GO-2022-0229.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0229
Aliases
Published
2022-07-06T18:23:48Z
Modified
2024-05-20T16:03:47Z
Summary
Panic in certificate parsing in crypto/x509 and golang.org/x/crypto/cryptobyte
Details

On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing functions of golang.org/x/crypto/cryptobyte can lead to a panic.

The malformed certificate can be delivered via a crypto/tls connection to a client, or to a server that accepts client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2022-0229"
}
References
Credits
    • Project Wycheproof

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.16
Introduced
1.13.0-0
Fixed
1.13.7

Ecosystem specific

{
    "imports": [
        {
            "path": "crypto/x509"
        }
    ]
}

Go / golang.org/x/crypto

Package

Name
golang.org/x/crypto
View open source insights on deps.dev
Purl
pkg:golang/golang.org/x/crypto

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20200124225646-8b5121be2f68

Ecosystem specific

{
    "imports": [
        {
            "path": "golang.org/x/crypto/cryptobyte"
        }
    ]
}