blob: 9bda183bd537ca980f70f733a977518bfb6fe3db [file] [log] [blame]
modules:
- module: std
versions:
- fixed: 1.17.9
- introduced: 1.18.0
fixed: 1.18.1
vulnerable_at: 1.18.0
packages:
- package: crypto/elliptic
symbols:
- p256GetScalar
derived_symbols:
- CurveParams.ScalarBaseMult
- CurveParams.ScalarMult
- p256Curve.CombinedMult
- p256Curve.ScalarBaseMult
- p256Curve.ScalarMult
description: |
A crafted scalar input longer than 32 bytes can cause P256().ScalarMult
or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and
crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.
published: 2022-05-20T21:17:46Z
cves:
- CVE-2022-28327
credit: Project Wycheproof
references:
- fix: https://go.dev/cl/397135
- fix: https://go.googlesource.com/go/+/37065847d87df92b5eb246c88ba2085efcf0b331
- report: https://go.dev/issue/52075
- web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8