Hi All,
I'm just opening this, as upstream golang 1.11.5/1.10.8 was released with a fix for cve CVE-2019-6486, which I believe affects etcd.
https://groups.google.com/forum/m/#!topic/golang-announce/mVeX35iXuSw
This DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU.
These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery.
The issue is CVE-2019-6486 and Go issue golang.org/issue/29903. See the Go issue for more details.
@knisbet thanks for the report
@hexfusion @jpbetz We need a patch release with the new Go runtime.
I will work on scheduling for next week, this should only affect release-3.3 so Joe is off the hook.
@hexfusion That's convenient! Ping me if you need any help.
@hexfusion @jpbetz We only need v3.3 patch release with 1.10.8.
@hexfusion will help us with the signing.
Released v3.3.12 with Go 1.10.8.
Signing will be completed within the hour