Vulnerability Description
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Net | <= 2018-09-17 |
| Fedoraproject | Fedora | 28 |
Related Weaknesses (CWE)
References
- https://github.com/golang/go/issues/27702ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://github.com/golang/go/issues/27702ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2018-17142?
CVE-2018-17142 is a vulnerability with a CVSS score of 7.5 (HIGH). The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.
How severe is CVE-2018-17142?
CVE-2018-17142 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-17142?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Net, Fedoraproject Fedora.