CVE-2019-17596

Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:2019.1.0:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:2019.1.1:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:2019.1.2:*:*:*:*:*:*:*
cpe:2.3:a:arista:terminattr:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:mos:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:06

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/', 'name': 'FEDORA-2019-34e097c66c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/', 'name': 'FEDORA-2019-4593120208', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/ -

30 Nov 2021, 19:42

Type Values Removed Values Added
CPE cpe:2.3:a:arista:cloudvision_portal:2019.1.0:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:arista:terminattr:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:2019.1.1:*:*:*:*:*:*:*
cpe:2.3:o:arista:mos:*:*:*:*:*:*:*:*
cpe:2.3:a:arista:cloudvision_portal:2019.1.2:*:*:*:*:*:*:*
References (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46 - (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46 - Third Party Advisory

17 Nov 2021, 22:16

Type Values Removed Values Added
References
  • (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46 -

10 Nov 2021, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46', 'name': 'https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46', 'tags': [], 'refsource': 'MISC'}

08 Nov 2021, 12:15

Type Values Removed Values Added
References
  • (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46 -

22 Mar 2021, 16:01

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/ - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20191122-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20191122-0005/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0101 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0101 - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0329 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0329 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

13 Mar 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html -

Information

Published : 2019-10-24 22:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-17596

Mitre link : CVE-2019-17596

CVE.ORG link : CVE-2019-17596


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • developer_tools
  • enterprise_linux_server

fedoraproject

  • fedora

opensuse

  • leap

arista

  • eos
  • terminattr
  • mos
  • cloudvision_portal

golang

  • go

debian

  • debian_linux
CWE
CWE-436

Interpretation Conflict