vulnerability

Rocky Linux: CVE-2021-34558: container-tools-rhel8 (Multiple Advisories)

Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
Jul 15, 2021
Added
Mar 12, 2024
Modified
Aug 13, 2025

Description

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

Solutions

rocky-upgrade-aardvark-dnsrocky-upgrade-conmonrocky-upgrade-conmon-debuginforocky-upgrade-conmon-debugsourcerocky-upgrade-containernetworking-pluginsrocky-upgrade-containernetworking-plugins-debuginforocky-upgrade-containernetworking-plugins-debugsourcerocky-upgrade-containers-commonrocky-upgrade-crunrocky-upgrade-crun-debuginforocky-upgrade-crun-debugsourcerocky-upgrade-delverocky-upgrade-delve-debuginforocky-upgrade-delve-debugsourcerocky-upgrade-fuse-overlayfsrocky-upgrade-fuse-overlayfs-debuginforocky-upgrade-fuse-overlayfs-debugsourcerocky-upgrade-go-toolsetrocky-upgrade-golangrocky-upgrade-golang-binrocky-upgrade-golang-racerocky-upgrade-grafanarocky-upgrade-grafana-debuginforocky-upgrade-libslirprocky-upgrade-libslirp-debuginforocky-upgrade-libslirp-debugsourcerocky-upgrade-libslirp-develrocky-upgrade-netavarkrocky-upgrade-oci-seccomp-bpf-hookrocky-upgrade-oci-seccomp-bpf-hook-debuginforocky-upgrade-oci-seccomp-bpf-hook-debugsourcerocky-upgrade-runcrocky-upgrade-runc-debuginforocky-upgrade-runc-debugsourcerocky-upgrade-slirp4netnsrocky-upgrade-slirp4netns-debuginforocky-upgrade-slirp4netns-debugsourcerocky-upgrade-toolboxrocky-upgrade-toolbox-debuginforocky-upgrade-toolbox-debugsourcerocky-upgrade-toolbox-tests
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.