blob: d91f3561f934b4dd5c0bc4fe3c0cf373f51059d0 [file] [log] [blame]
Damien Neilb5cb7652022-08-18 15:09:12 -07001modules:
Damien Neil77344fd2022-05-10 15:03:50 -07002 - module: golang.org/x/crypto
Damien Neil77344fd2022-05-10 15:03:50 -07003 versions:
Damien Neildf2d3d32022-05-12 16:02:17 -07004 - fixed: 0.0.0-20200220183623-bac4c82f6975
Damien Neilb5cb7652022-08-18 15:09:12 -07005 packages:
6 - package: golang.org/x/crypto/ssh
7 symbols:
8 - parseED25519
9 - ed25519PublicKey.Verify
10 - parseSKEd25519
11 - skEd25519PublicKey.Verify
12 - NewPublicKey
Roland Shoemakera3a17c92021-04-14 12:59:24 -070013description: |
Jonathan Amsterdam2552b962022-02-02 12:53:36 -050014 An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
15 key, such that the library will panic when trying to verify a signature
16 with it. If verifying signatures using user supplied public keys, this
17 may be used as a denial of service vector.
Jonathan Amsterdam49ef6142022-02-10 08:53:15 -050018published: 2021-04-14T20:04:52Z
Julie Qiu3008f8a2022-01-04 15:37:42 -050019cves:
20 - CVE-2020-9283
Jonathan Amsterdam1a19dd12022-03-01 10:04:31 -050021ghsas:
22 - GHSA-ffhg-7mh4-33c4
Roland Shoemakera3a17c92021-04-14 12:59:24 -070023credit: Alex Gaynor, Fish in a Barrel
Damien Neil00e94d72022-08-26 14:59:35 -070024references:
25 - fix: https://go.dev/cl/220357
26 - fix: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
27 - web: https://groups.google.com/g/golang-announce/c/3L45YRc91SY