Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto/elliptic: generic P-256 panic when scalar has too many leading zeroes (CVE-2022-28327) [1.17 backport] #52076

Closed
gopherbot opened this issue Mar 31, 2022 · 2 comments
Labels
CherryPickApproved Used during the release process for point releases FrozenDueToAge release-blocker Security
Milestone

Comments

@gopherbot
Copy link
Contributor

@FiloSottile requested issue #52075 to be considered for backport to the next 1.17 minor release.

@gopherbot please open backport issues for this security fix.

@gopherbot gopherbot added the CherryPickCandidate Used during the release process for point releases label Mar 31, 2022
@gopherbot gopherbot added this to the Go1.17.9 milestone Mar 31, 2022
@gopherbot
Copy link
Contributor Author

Change https://go.dev/cl/397136 mentions this issue: [release-branch.go1.17] crypto/elliptic: tolerate zero-padded scalars in generic P-256

@FiloSottile FiloSottile changed the title crypto/elliptic: generic P-256 panic when scalar has too many leading zeroes [1.17 backport] crypto/elliptic: generic P-256 panic when scalar has too many leading zeroes (CVE-2022-28327) [1.17 backport] Apr 1, 2022
@cherrymui cherrymui added CherryPickApproved Used during the release process for point releases and removed CherryPickCandidate Used during the release process for point releases labels Apr 6, 2022
@gopherbot
Copy link
Contributor Author

Closed by merging 7139e8b to release-branch.go1.17.

gopherbot pushed a commit that referenced this issue Apr 6, 2022
… in generic P-256

Updates #52075
Fixes #52076
Fixes CVE-2022-28327

Change-Id: I595a7514c9a0aa1b9c76aedfc2307e1124271f27
Reviewed-on: https://go-review.googlesource.com/c/go/+/397136
Trust: Filippo Valsorda <filippo@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
rcrozean pushed a commit to rcrozean/go that referenced this issue Oct 5, 2022
# AWS EKS
Backported To: go-1.15.15-eks
Backported On: Thu, 22 Sept 2022
Backported By: budris@amazon.com
Backported From: release-branch.go1.17
EKS Patch Source Commit: danbudris@2664205
Upstream Source Commit: golang@7139e8b

# Original Information

Updates golang#52075
Fixes golang#52076
Fixes CVE-2022-28327

Change-Id: I595a7514c9a0aa1b9c76aedfc2307e1124271f27
Reviewed-on: https://go-review.googlesource.com/c/go/+/397136
Trust: Filippo Valsorda <filippo@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
rcrozean pushed a commit to rcrozean/go that referenced this issue Oct 12, 2022
# AWS EKS
Backported To: go-1.15.15-eks
Backported On: Thu, 22 Sept 2022
Backported By: budris@amazon.com
Backported From: release-branch.go1.17
EKS Patch Source Commit: danbudris@2664205
Upstream Source Commit: golang@7139e8b

# Original Information

Updates golang#52075
Fixes golang#52076
Fixes CVE-2022-28327

Change-Id: I595a7514c9a0aa1b9c76aedfc2307e1124271f27
Reviewed-on: https://go-review.googlesource.com/c/go/+/397136
Trust: Filippo Valsorda <filippo@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
@golang golang locked and limited conversation to collaborators Apr 6, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
CherryPickApproved Used during the release process for point releases FrozenDueToAge release-blocker Security
Projects
None yet
Development

No branches or pull requests

4 participants