{"id":"GO-2023-1992","summary":"Misleading message verification in golang.org/x/crypto/openpgp/clearsign","details":"The clearsign package accepts some malformed messages, making it possible for an attacker to trick a human user (but not a Go program) into thinking unverified text is part of the message.\n\nWith fix, messages with malformed headers in the SIGNED MESSAGE section are rejected.","aliases":["CVE-2019-11841","GHSA-x3jr-pf6g-c48f"],"modified":"2026-03-17T04:49:58.936346Z","published":"2023-08-23T14:38:42Z","related":["CGA-cq4c-pmhg-4723"],"database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2023-1992"},"references":[{"type":"FIX","url":"https://go-review.git.corp.google.com/c/crypto/+/173778"},{"type":"FIX","url":"https://go.googlesource.com/crypto/+/c05e17bb3b2dca130fc919668a96b4bec9eb9442"},{"type":"WEB","url":"https://groups.google.com/d/msg/golang-openpgp/6vdgZoTgbIY/K6bBY9z3DAAJ"}],"affected":[{"package":{"name":"golang.org/x/crypto","ecosystem":"Go","purl":"pkg:golang/golang.org/x/crypto"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.0.0-20190424203555-c05e17bb3b2d"}]}],"ecosystem_specific":{"imports":[{"symbols":["Decode"],"path":"golang.org/x/crypto/openpgp/clearsign"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1992.json"}}],"schema_version":"1.7.5","credits":[{"name":"Aida Mynzhasova (SEC Consult Vulnerability Lab)"}]}