blob: e2db96e5d85f25493c25cbafa63c0393466d39c3 [file] [log] [blame]
packages:
- module: std
package: crypto/elliptic
symbols:
- curve.doubleJacobian
versions:
- fixed: 1.10.8
- introduced: 1.11.0
fixed: 1.11.5
description: |
A DoS vulnerability in the crypto/elliptic implementations of the P-521 and
P-384 elliptic curves may let an attacker craft inputs that consume
excessive amounts of CPU.
These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private
key is reused more than once, the attack can also lead to key recovery.
cves:
- CVE-2019-6486
credit: Wycheproof Project
links:
pr: https://go.dev/cl/159218
commit: https://go.googlesource.com/go/+/193c16a3648b8670a762e925b6ac6e074f468a20
context:
- https://go.dev/issue/29903
- https://groups.google.com/g/golang-announce/c/mVeX35iXuSw