GO-2022-0435

Source
https://pkg.go.dev/vuln/GO-2022-0435
Import Source
https://vuln.go.dev/ID/GO-2022-0435.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0435
Aliases
Published
2022-05-20T21:17:46Z
Modified
2024-05-20T16:03:47Z
Summary
Panic due to large inputs affecting P-256 curves in crypto/elliptic
Details

A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2022-0435"
}
References
Credits
    • Project Wycheproof

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.9
Introduced
1.18.0-0
Fixed
1.18.1

Ecosystem specific

{
    "imports": [
        {
            "path": "crypto/elliptic",
            "symbols": [
                "CurveParams.ScalarBaseMult",
                "CurveParams.ScalarMult",
                "p256Curve.CombinedMult",
                "p256Curve.ScalarBaseMult",
                "p256Curve.ScalarMult",
                "p256GetScalar"
            ]
        }
    ]
}