GHSA-86r9-39j9-99wp

Source
https://github.com/advisories/GHSA-86r9-39j9-99wp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-86r9-39j9-99wp/GHSA-86r9-39j9-99wp.json
Aliases
Published
2021-06-23T17:17:52Z
Modified
2023-11-08T03:58:37.751733Z
Details

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.

References

Affected packages

Go / gopkg.in/square/go-jose.v1

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.0.4

Go / github.com/square/go-jose

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.0.4