Source: golang-github-russellhaering-goxmldsig
Version: 0.0~git20180430.7acd5e4-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for 
golang-github-russellhaering-goxmldsig.

CVE-2020-15216[0]:
| In goxmldsig (XML Digital Signatures implemented in pure Go) before
| version 1.1.0, with a carefully crafted XML file, an attacker can
| completely bypass signature validation and pass off an altered file as
| a signed one. A patch is available, all users of goxmldsig should
| upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64
| or version 1.1.0


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15216
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15216
[1] 
https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
[2] 
https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64

Regards,
Salvatore

Reply via email to