CVE-2017-1000097
Published: 5 October 2017
On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.
Notes
Author | Note |
---|---|
mdeslaur | Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays. |
Priority
Status
Package | Release | Status |
---|---|---|
golang Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was not-affected [Darwin only])
|
upstream |
Not vulnerable
(Darwin only)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
golang-1.6 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was not-affected [Darwin only])
|
upstream |
Not vulnerable
(Darwin only)
|
|
xenial |
Not vulnerable
(Darwin only)
|
|
zesty |
Not vulnerable
(Darwin only)
|
|
golang-1.7 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
(trusty was not-affected [Darwin only])
|
upstream |
Not vulnerable
(Darwin only)
|
|
xenial |
Does not exist
|
|
zesty |
Not vulnerable
(Darwin only)
|
|
golang-1.8 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
upstream |
Not vulnerable
(Darwin only)
|
|
xenial |
Does not exist
|
|
zesty |
Not vulnerable
(Darwin only)
|
|
golang-1.9 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
upstream |
Not vulnerable
(Darwin only)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |