Allele Security Alert
CPU denial of service in chain validation
The Go Authors
Go before 1.11.3 and 1.10.6
Proof of concept
The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients verifying certificates are affected.
Go security releases 1.11.3 and 1.10.6
crypto/x509: CPU denial of service in chain validation #29233
[release-branch.go1.11-security] crypto/x509: limit number of signature checks for each verification
[release-branch.go1.10-security] crypto/x509: limit number of signature checks for each verification
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: February 11, 2019