The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"vendor_product": "fedoraproject:fedora",
"extracted_events": [
{
"last_affected": "22"
},
{
"last_affected": "23"
},
{
"last_affected": "24"
}
],
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"
]
},
{
"vendor_product": "opensuse:leap",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "42.1"
}
],
"cpes": [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
]
}
]
}