vulnerability
Red Hat OpenShift: CVE-2021-34558: golang: crypto/tls: certificate of wrong type is causing TLS client to panic
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:H/Au:N/C:N/I:N/A:P) | 2021-07-15 | 2021-08-12 | 2025-04-11 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
2021-07-15
Added
2021-08-12
Modified
2025-04-11
Description
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
Solution(s)
linuxrpm-upgrade-atomic-openshift-service-idlerlinuxrpm-upgrade-butanelinuxrpm-upgrade-containernetworking-pluginslinuxrpm-upgrade-cri-olinuxrpm-upgrade-cri-toolslinuxrpm-upgrade-golang-github-prometheus-promulinuxrpm-upgrade-ignitionlinuxrpm-upgrade-openshiftlinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-openshift4-wincw-windows-machine-config-rhel8-operatorlinuxrpm-upgrade-redhat-release-coreos
References
- CVE-2021-34558
- https://attackerkb.com/topics/CVE-2021-34558
- REDHAT-RHSA-2021:2983
- REDHAT-RHSA-2021:2984
- REDHAT-RHSA-2021:3009
- REDHAT-RHSA-2021:3015
- REDHAT-RHSA-2021:3076
- REDHAT-RHSA-2021:3146
- REDHAT-RHSA-2021:3229
- REDHAT-RHSA-2021:3248
- REDHAT-RHSA-2021:3259
- REDHAT-RHSA-2021:3361
- REDHAT-RHSA-2021:3555
- REDHAT-RHSA-2021:3556
- REDHAT-RHSA-2021:3598
- REDHAT-RHSA-2021:3733
- REDHAT-RHSA-2021:3759
- REDHAT-RHSA-2021:3820
- REDHAT-RHSA-2021:4104
- REDHAT-RHSA-2021:4226
- REDHAT-RHSA-2021:4582
- REDHAT-RHSA-2021:4722
- REDHAT-RHSA-2021:4725
- REDHAT-RHSA-2021:4914
- REDHAT-RHSA-2021:5085
- REDHAT-RHSA-2021:5086
- REDHAT-RHSA-2022:0191
- REDHAT-RHSA-2022:0237
- REDHAT-RHSA-2022:0260
- REDHAT-RHSA-2022:0577
- REDHAT-RHSA-2022:0947
- REDHAT-RHSA-2022:0988
- REDHAT-RHSA-2022:0998
- REDHAT-RHSA-2022:1329
- REDHAT-RHSA-2022:1372
- REDHAT-RHSA-2022:7954

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.