Source: golang-filippo-edwards25519
Version: 1.0.0~rc1+git20210721-0.1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-filippo-edwards25519.

CVE-2026-26958[0]:
| filippo.io/edwards25519 is a Go library implementing the
| edwards25519 elliptic curve with APIs for building cryptographic
| primitives. In versions 1.1.0 and earlier, MultiScalarMult produces
| invalid results or undefined behavior if the receiver is not the
| identity point. If (*Point).MultiScalarMult is called on an
| initialized point that is not the identity point, it returns an
| incorrect result. If the method is called on an uninitialized point,
| the behavior is undefined. In particular, if the receiver is the
| zero value, MultiScalarMult returns an invalid point that compares
| Equal to every other point. Note that MultiScalarMult is a rarely
| used, advanced API. For example, users who depend on
| filippo.io/edwards25519 only through github.com/go-sql-driver/mysql
| are not affected. This issue has been fixed in version 1.1.1.

As described from upstream, MultiScalarMult is a rearely used,
advanced API. But I noticed that we have the same version across
bookworm up to unstable, it might be a good idea to rebase unstable's
version for aim to include in forky to a recent version.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26958
    https://www.cve.org/CVERecord?id=CVE-2026-26958
[1] 
https://github.com/FiloSottile/edwards25519/security/advisories/GHSA-fw7p-63qq-7hpr
[2] 
https://github.com/FiloSottile/edwards25519/commit/d1c650afb95fad0742b98d95f2eb2cf031393abb

Regards,
Salvatore

Reply via email to