You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
mend-bolt-for-githubbot
changed the title
CVE-2018-16875 (High) detected in github.com/docker/docker-v20.10.9
CVE-2018-16875 (High) detected in github.com/docker/docker-v20.10.9 - autoclosed
Mar 15, 2022
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
CVE-2018-16875 - High Severity Vulnerability
Vulnerable Library - github.com/docker/docker-v20.10.9
Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
Dependency Hierarchy:
Found in HEAD commit: c8980a5bef352bb4b9477331dcc940aca400e10b
Found in base branch: main
Vulnerability Details
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
Publish Date: 2018-12-14
URL: CVE-2018-16875
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-16875
Release Date: 2018-12-14
Fix Resolution: 1.10.6,1.11.3
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: