When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
{
"binaries": [
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-go"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-go-shared-dev"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-src"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "libgolang-1.8-std1"
}
]
}