Go before versions 1.10.8 and 1.11.5 has a vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves. A remote attacker can exploit this by crafting inputs that consume excessive amounts of CPU. These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery. External Reference: https://groups.google.com/forum/m/#!topic/golang-announce/mVeX35iXuSw Upstream Issue: https://golang.org/issue/29903 Upstream Patch: https://github.com/golang/go/commit/42b42f71
Created golang tracking bugs for this issue: Affects: epel-all [bug 1668975] Affects: fedora-all [bug 1668973] Created golang:1.10/golang tracking bugs for this issue: Affects: fedora-all [bug 1668974]
This issue affects the versions of golang as shipped with Red Hat Ceph Storage 2, 3 and Red Hat Gluster Storage 3 as it includes the vulnerable code.
Created golang:1.10/golang tracking bugs for this issue: Affects: fedora-all [bug 1671279]
Created golang:1.10/golang tracking bugs for this issue: Affects: fedora-all [bug 1826587]