First published: Wed Mar 08 2023(Updated: )
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Go 1.20.2 and Go | <1.19.7 | 1.19.7 |
Go | <1.19.7 | |
Go | >=1.20.0<1.20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24532 is medium with a severity value of 5.3.
The affected software versions for CVE-2023-24532 are Go 1.20.2 and Go versions up to 1.19.7.
CVE-2023-24532 does not impact usages of crypto/ecdsa or crypto/ecdh.
The recommended remedy for CVE-2023-24532 is to update to Go version 1.19.7 or apply the provided fix from Red Hat.
Yes, you can find public references for CVE-2023-24532 at the following URLs: <br> - [https://go.dev/cl/471255](https://go.dev/cl/471255) <br> - [https://pkg.go.dev/vuln/GO-2023-1621](https://pkg.go.dev/vuln/GO-2023-1621) <br> - [https://groups.google.com/g/golang-announce/c/3-TpUx48iQY](https://groups.google.com/g/golang-announce/c/3-TpUx48iQY)