| { |
| "schema_version": "1.3.1", |
| "id": "GO-2022-0217", |
| "modified": "0001-01-01T00:00:00Z", |
| "published": "2022-05-24T15:21:01Z", |
| "aliases": [ |
| "CVE-2019-6486" |
| ], |
| "summary": "Denial of service affecting P-521 and P-384 curves in crypto/elliptic", |
| "details": "A DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU.\n\nThese inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery.", |
| "affected": [ |
| { |
| "package": { |
| "name": "stdlib", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "0" |
| }, |
| { |
| "fixed": "1.10.8" |
| }, |
| { |
| "introduced": "1.11.0-0" |
| }, |
| { |
| "fixed": "1.11.5" |
| } |
| ] |
| } |
| ], |
| "ecosystem_specific": { |
| "imports": [ |
| { |
| "path": "crypto/elliptic", |
| "symbols": [ |
| "curve.doubleJacobian" |
| ] |
| } |
| ] |
| } |
| } |
| ], |
| "references": [ |
| { |
| "type": "FIX", |
| "url": "https://go.dev/cl/159218" |
| }, |
| { |
| "type": "FIX", |
| "url": "https://go.googlesource.com/go/+/193c16a3648b8670a762e925b6ac6e074f468a20" |
| }, |
| { |
| "type": "REPORT", |
| "url": "https://go.dev/issue/29903" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://groups.google.com/g/golang-announce/c/mVeX35iXuSw" |
| } |
| ], |
| "credits": [ |
| { |
| "name": "Wycheproof Project" |
| } |
| ], |
| "database_specific": { |
| "url": "https://pkg.go.dev/vuln/GO-2022-0217" |
| } |
| } |