Vulnerability Report: GO-2022-0531
standard library- CVE-2022-30629
- Affects: crypto/tls
- Published: Jul 28, 2022
- Modified: May 20, 2024
An attacker can correlate a resumed TLS session with a previous connection. Session tickets generated by crypto/tls do not contain a randomly generated ticket_age_add, which allows an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.
Affected Packages
-
PathGo VersionsSymbols
-
before go1.17.11, from go1.18.0-0 before go1.18.3
1 unexported affected symbols
- serverHandshakeStateTLS13.sendSessionTickets
Aliases
References
- https://go.dev/cl/405994
- https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5
- https://go.dev/issue/52814
- https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
- https://vuln.go.dev/ID/GO-2022-0531.json
Credits
- Github user @nervuri
Feedback
See anything missing or incorrect?
Suggest an edit to this report.