blob: 5fcdd98a04ebb8ef4503ad7cd863f9423e3b6cae [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2020-0012",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-9283",
"GHSA-ffhg-7mh4-33c4"
],
"summary": "Panic due to improper verification of cryptographic signatures in golang.org/x/crypto/ssh",
"details": "An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public key, such that the library will panic when trying to verify a signature with it. If verifying signatures using user supplied public keys, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/crypto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20200220183623-bac4c82f6975"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/crypto/ssh",
"symbols": [
"CertChecker.Authenticate",
"CertChecker.CheckCert",
"CertChecker.CheckHostKey",
"Certificate.Verify",
"Dial",
"NewClientConn",
"NewPublicKey",
"NewServerConn",
"NewSignerFromKey",
"NewSignerFromSigner",
"ParseAuthorizedKey",
"ParseKnownHosts",
"ParsePrivateKey",
"ParsePrivateKeyWithPassphrase",
"ParsePublicKey",
"ParseRawPrivateKey",
"ParseRawPrivateKeyWithPassphrase",
"ed25519PublicKey.Verify",
"parseED25519",
"parseSKEd25519",
"skEd25519PublicKey.Verify"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/220357"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/3L45YRc91SY"
}
],
"credits": [
{
"name": "Alex Gaynor, Fish in a Barrel"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0012",
"review_status": "REVIEWED"
}
}