CVE-2017-1000097

Published: 05 October 2017

On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
golang
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(Darwin only)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [Darwin only])
golang-1.6
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(Darwin only)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(Darwin only)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [Darwin only])
golang-1.7
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(Darwin only)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [Darwin only])
golang-1.8
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(Darwin only)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

golang-1.9
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(Darwin only)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Notes

AuthorNote
mdeslaur
Packages built using golang need to be rebuilt once the
vulnerability has been fixed. This CVE entry does not
list packages that need rebuilding outside of the main
repository or the Ubuntu variants with PPA overlays.

References