 
        | Release Date: | 2019-10-24 | |
| Impact: | None | What is this? | 
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
See more information about CVE-2019-17596 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 7.5 | 
| Vector String: | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 
| Version: | 3.0 | 
| Attack Vector: | Network | 
| Attack Complexity: | Low | 
| Privileges Required: | None | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | None | 
| Integrity Impact: | None | 
| Availability Impact: | High | 
| Platform | Errata | Release Date | 
| Oracle Linux version 8 (go-toolset) | ELSA-2020-0329 | 2020-02-17 | 
| Oracle Linux version 8 (golang) | ELSA-2020-0329 | 2020-02-17 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: