{"id":"GO-2022-0191","summary":"Denial of service in chain verification in crypto/x509","details":"The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients verifying certificates are affected.","aliases":["CVE-2018-16875"],"modified":"2024-05-20T16:03:47Z","published":"2022-07-15T23:03:26Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-0191","review_status":"REVIEWED"},"references":[{"type":"FIX","url":"https://go.dev/cl/154105"},{"type":"FIX","url":"https://go.googlesource.com/go/+/770130659b6fb2acf271476579a3644e093dda7f"},{"type":"REPORT","url":"https://go.dev/issue/29233"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0"}],"affected":[{"package":{"name":"stdlib","ecosystem":"Go","purl":"pkg:golang/stdlib"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.10.6"},{"introduced":"1.11.0-0"},{"fixed":"1.11.3"}]}],"ecosystem_specific":{"imports":[{"path":"crypto/x509","symbols":["CertPool.findVerifiedParents","Certificate.buildChains"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0191.json"}}],"schema_version":"1.7.3","credits":[{"name":"Netflix"}]}