Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 21 Dec 2015 22:38:09 +0100
From: Florian Weimer <>
Subject: Re: CVE request for math/big.Exp

On 12/21/2015 05:07 PM, Jason Buberel wrote:
> OSS-Security,
> The Go open source project has received notification of an error in the
> math/big library ( The problem that was
> identified is similar to CVE-2015-3193
> <>. The
> vulnerability was introduced in the 1.5 release, and remains present in Go
> 1.5.1 and 1.5.2.
> A fix for the issue has been applied to the master branch of the Go repo
> under CL 17672 <>. We will
> also be releasing Go 1.5.3 to fix this vulnerability.
> We are requesting a CVE ID in order to coordinate updates with
> distributions that include binary packages for the Go programming language.
> We will also announce and request that all Go programs using the math/big
> package that were compiled with version 1.5, 1.5.1, or 1.5.2 be recompiled
> with  1.5.3 (when released) due to the static linking nature of the Go
> toolchain.

Considering that until recently, Go did not protect against RSA-CRT key
leaks, doesn't that mean that all certificates whose private key was
touched by Go code should be re-issued?

RSA-CRT hardening was added in this commit:

To protect against future key leaks due to similar issues in the
implementation integer arithmetic, I strongly recommend backporting this
hardening feature.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.