First published: Thu Nov 12 2020(Updated: )
A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.18.4-2.el8 | 0:0.18.4-2.el8 |
redhat/kiali | <0:v1.24.4.redhat2-1.el8 | 0:v1.24.4.redhat2-1.el8 |
redhat/go-toolset | <1.14-0:1.14.12-1.el7_9 | 1.14-0:1.14.12-1.el7_9 |
redhat/go-toolset | <1.14-golang-0:1.14.12-1.el7_9 | 1.14-golang-0:1.14.12-1.el7_9 |
redhat/cri-o | <0:1.19.1-2.rhaos4.6.git2af9ecf.el8 | 0:1.19.1-2.rhaos4.6.git2af9ecf.el8 |
redhat/openshift | <0:4.6.0-202012190744.p0.git.94235.c62c6f7.el8 | 0:4.6.0-202012190744.p0.git.94235.c62c6f7.el8 |
redhat/openshift-clients | <0:4.6.0-202012172338.p0.git.3800.30af700.el7 | 0:4.6.0-202012172338.p0.git.3800.30af700.el7 |
redhat/skopeo | <1:1.1.1-3.rhaos4.6.el8 | 1:1.1.1-3.rhaos4.6.el8 |
redhat/openshift-eventrouter | <0:0.2-6.git7c289cc.el8 | 0:0.2-6.git7c289cc.el8 |
redhat/cri-tools | <0:1.20.0-2.el8 | 0:1.20.0-2.el8 |
redhat/runc | <0:1.0.0-95.rhaos4.8.gitcd80260.el8 | 0:1.0.0-95.rhaos4.8.gitcd80260.el8 |
redhat/ignition | <0:2.9.0-2.rhaos4.7.git1d56dc8.el8 | 0:2.9.0-2.rhaos4.7.git1d56dc8.el8 |
redhat/golang-github-prometheus-promu | <0:0.5.0-3.git642a960.el8 | 0:0.5.0-3.git642a960.el8 |
redhat/mcg | <0:5.7.0-69.85e2026.5.7.el8 | 0:5.7.0-69.85e2026.5.7.el8 |
Golang Go | <1.14.12 | |
Golang Go | >=1.15<1.15.5 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Netapp Cloud Insights Telegraf Agent | ||
Netapp Trident | ||
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2020-28362 is high.
Go versions before 1.14.12 and 1.15.x before 1.15.4 are affected.
CVE-2020-28362 causes a denial of service by allowing an attacker to craft a certificate chain that can trigger a panic in applications using math/big via cryptographic packages.
To fix CVE-2020-28362, update to Go version 1.15.5 or 1.14.12, depending on the affected version.
You can find more information about CVE-2020-28362 on the CVE website (CVE-2020-28362), the NVD (CVE-2020-28362), and the Red Hat bugzilla and errata pages.