The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Golang
Subscribe
|
Go
Subscribe
|
|
Netapp
Subscribe
|
|
|
Oracle
Subscribe
|
Timesten In-memory Database
Subscribe
|
|
Redhat
Subscribe
|
Advanced Cluster Security
Subscribe
Container Native Virtualization
Subscribe
Devtools
Subscribe
Enterprise Linux
Subscribe
Jaeger
Subscribe
Openshift
Subscribe
Openshift Data Foundation
Subscribe
Openshift Sandboxed Containers
Subscribe
Openshift Service On Aws
Subscribe
Openstack
Subscribe
Rhmt
Subscribe
Serverless
Subscribe
Stf
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21208 | The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat stf
|
|
| CPEs | cpe:/a:redhat:stf:1.3::el8 | |
| Vendors & Products |
Redhat service Telemetry Framework
|
Redhat stf
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T00:12:50.360Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34558
No data.
Status : Modified
Published: 2021-07-15T14:15:19.660
Modified: 2024-11-21T06:10:40.993
Link: CVE-2021-34558
OpenCVE Enrichment
No data.
EUVD