diff options
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-devtools/go/go-1.17.13.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/go/go-1.19/CVE-2023-29409.patch | 175 |
2 files changed, 176 insertions, 0 deletions
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index e0f02f3e28..91dd886cd0 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc | |||
| @@ -42,6 +42,7 @@ SRC_URI += "\ | |||
| 42 | file://CVE-2023-24536_3.patch \ | 42 | file://CVE-2023-24536_3.patch \ |
| 43 | file://CVE-2023-24531_1.patch \ | 43 | file://CVE-2023-24531_1.patch \ |
| 44 | file://CVE-2023-24531_2.patch \ | 44 | file://CVE-2023-24531_2.patch \ |
| 45 | file://CVE-2023-29409.patch \ | ||
| 45 | " | 46 | " |
| 46 | SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" | 47 | SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" |
| 47 | 48 | ||
diff --git a/meta/recipes-devtools/go/go-1.19/CVE-2023-29409.patch b/meta/recipes-devtools/go/go-1.19/CVE-2023-29409.patch new file mode 100644 index 0000000000..38451f7555 --- /dev/null +++ b/meta/recipes-devtools/go/go-1.19/CVE-2023-29409.patch | |||
| @@ -0,0 +1,175 @@ | |||
| 1 | From 2300f7ef07718f6be4d8aa8486c7de99836e233f Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Roland Shoemaker <bracewell@google.com> | ||
| 3 | Date: Wed, 23 Aug 2023 12:03:43 +0000 | ||
| 4 | Subject: [PATCH] crypto/tls: restrict RSA keys in certificates to <= 8192 bits | ||
| 5 | |||
| 6 | Extremely large RSA keys in certificate chains can cause a client/server | ||
| 7 | to expend significant CPU time verifying signatures. Limit this by | ||
| 8 | restricting the size of RSA keys transmitted during handshakes to <= | ||
| 9 | 8192 bits. | ||
| 10 | |||
| 11 | Based on a survey of publicly trusted RSA keys, there are currently only | ||
| 12 | three certificates in circulation with keys larger than this, and all | ||
| 13 | three appear to be test certificates that are not actively deployed. It | ||
| 14 | is possible there are larger keys in use in private PKIs, but we target | ||
| 15 | the web PKI, so causing breakage here in the interests of increasing the | ||
| 16 | default safety of users of crypto/tls seems reasonable. | ||
| 17 | |||
| 18 | Thanks to Mateusz Poliwczak for reporting this issue. | ||
| 19 | |||
| 20 | Updates #61460 | ||
| 21 | Fixes #61579 | ||
| 22 | Fixes CVE-2023-29409 | ||
| 23 | |||
| 24 | Change-Id: Ie35038515a649199a36a12fc2c5df3af855dca6c | ||
| 25 | Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1912161 | ||
| 26 | Reviewed-by: Damien Neil <dneil@google.com> | ||
| 27 | Reviewed-by: Tatiana Bradley <tatianabradley@google.com> | ||
| 28 | Run-TryBot: Roland Shoemaker <bracewell@google.com> | ||
| 29 | (cherry picked from commit d865c715d92887361e4bd5596e19e513f27781b7) | ||
| 30 | Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1965487 | ||
| 31 | Reviewed-on: https://go-review.googlesource.com/c/go/+/514915 | ||
| 32 | Run-TryBot: David Chase <drchase@google.com> | ||
| 33 | Reviewed-by: Matthew Dempsky <mdempsky@google.com> | ||
| 34 | TryBot-Bypass: David Chase <drchase@google.com> | ||
| 35 | |||
| 36 | CVE: CVE-2023-29409 | ||
| 37 | |||
| 38 | Upstream-Status: Backport [https://github.com/golang/go/commit/2300f7ef07718f6be4d8aa8486c7de99836e233f] | ||
| 39 | |||
| 40 | Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> | ||
| 41 | --- | ||
| 42 | src/crypto/tls/handshake_client.go | 8 +++ | ||
| 43 | src/crypto/tls/handshake_client_test.go | 78 +++++++++++++++++++++++++ | ||
| 44 | src/crypto/tls/handshake_server.go | 4 ++ | ||
| 45 | 3 files changed, 90 insertions(+) | ||
| 46 | |||
| 47 | diff --git a/src/crypto/tls/handshake_client.go b/src/crypto/tls/handshake_client.go | ||
| 48 | index 85622f1..828d2cb 100644 | ||
| 49 | --- a/src/crypto/tls/handshake_client.go | ||
| 50 | +++ b/src/crypto/tls/handshake_client.go | ||
| 51 | @@ -852,6 +852,10 @@ func (hs *clientHandshakeState) sendFinished(out []byte) error { | ||
| 52 | return nil | ||
| 53 | } | ||
| 54 | |||
| 55 | +// maxRSAKeySize is the maximum RSA key size in bits that we are willing | ||
| 56 | +// to verify the signatures of during a TLS handshake. | ||
| 57 | +const maxRSAKeySize = 8192 | ||
| 58 | + | ||
| 59 | // verifyServerCertificate parses and verifies the provided chain, setting | ||
| 60 | // c.verifiedChains and c.peerCertificates or sending the appropriate alert. | ||
| 61 | func (c *Conn) verifyServerCertificate(certificates [][]byte) error { | ||
| 62 | @@ -862,6 +866,10 @@ func (c *Conn) verifyServerCertificate(certificates [][]byte) error { | ||
| 63 | c.sendAlert(alertBadCertificate) | ||
| 64 | return errors.New("tls: failed to parse certificate from server: " + err.Error()) | ||
| 65 | } | ||
| 66 | + if cert.PublicKeyAlgorithm == x509.RSA && cert.PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize { | ||
| 67 | + c.sendAlert(alertBadCertificate) | ||
| 68 | + return fmt.Errorf("tls: server sent certificate containing RSA key larger than %d bits", maxRSAKeySize) | ||
| 69 | + } | ||
| 70 | certs[i] = cert | ||
| 71 | } | ||
| 72 | |||
| 73 | diff --git a/src/crypto/tls/handshake_client_test.go b/src/crypto/tls/handshake_client_test.go | ||
| 74 | index 0228745..d581cb1 100644 | ||
| 75 | --- a/src/crypto/tls/handshake_client_test.go | ||
| 76 | +++ b/src/crypto/tls/handshake_client_test.go | ||
| 77 | @@ -2595,3 +2595,81 @@ func TestClientHandshakeContextCancellation(t *testing.T) { | ||
| 78 | t.Error("Client connection was not closed when the context was canceled") | ||
| 79 | } | ||
| 80 | } | ||
| 81 | + | ||
| 82 | +// discardConn wraps a net.Conn but discards all writes, but reports that they happened. | ||
| 83 | +type discardConn struct { | ||
| 84 | + net.Conn | ||
| 85 | +} | ||
| 86 | + | ||
| 87 | +func (dc *discardConn) Write(data []byte) (int, error) { | ||
| 88 | + return len(data), nil | ||
| 89 | +} | ||
| 90 | + | ||
| 91 | +// largeRSAKeyCertPEM contains a 8193 bit RSA key | ||
| 92 | +const largeRSAKeyCertPEM = `-----BEGIN CERTIFICATE----- | ||
| 93 | +MIIInjCCBIWgAwIBAgIBAjANBgkqhkiG9w0BAQsFADASMRAwDgYDVQQDEwd0ZXN0 | ||
| 94 | +aW5nMB4XDTIzMDYwNzIxMjMzNloXDTIzMDYwNzIzMjMzNlowEjEQMA4GA1UEAxMH | ||
| 95 | +dGVzdGluZzCCBCIwDQYJKoZIhvcNAQEBBQADggQPADCCBAoCggQBAWdHsf6Rh2Ca | ||
| 96 | +n2SQwn4t4OQrOjbLLdGE1pM6TBKKrHUFy62uEL8atNjlcfXIsa4aEu3xNGiqxqur | ||
| 97 | +ZectlkZbm0FkaaQ1Wr9oikDY3KfjuaXdPdO/XC/h8AKNxlDOylyXwUSK/CuYb+1j | ||
| 98 | +gy8yF5QFvVfwW/xwTlHmhUeSkVSQPosfQ6yXNNsmMzkd+ZPWLrfq4R+wiNtwYGu0 | ||
| 99 | +WSBcI/M9o8/vrNLnIppoiBJJ13j9CR1ToEAzOFh9wwRWLY10oZhoh1ONN1KQURx4 | ||
| 100 | +qedzvvP2DSjZbUccdvl2rBGvZpzfOiFdm1FCnxB0c72Cqx+GTHXBFf8bsa7KHky9 | ||
| 101 | +sNO1GUanbq17WoDNgwbY6H51bfShqv0CErxatwWox3we4EcAmFHPVTCYL1oWVMGo | ||
| 102 | +a3Eth91NZj+b/nGhF9lhHKGzXSv9brmLLkfvM1jA6XhNhA7BQ5Vz67lj2j3XfXdh | ||
| 103 | +t/BU5pBXbL4Ut4mIhT1YnKXAjX2/LF5RHQTE8Vwkx5JAEKZyUEGOReD/B+7GOrLp | ||
| 104 | +HduMT9vZAc5aR2k9I8qq1zBAzsL69lyQNAPaDYd1BIAjUety9gAYaSQffCgAgpRO | ||
| 105 | +Gt+DYvxS+7AT/yEd5h74MU2AH7KrAkbXOtlwupiGwhMVTstncDJWXMJqbBhyHPF8 | ||
| 106 | +3UmZH0hbL4PYmzSj9LDWQQXI2tv6vrCpfts3Cqhqxz9vRpgY7t1Wu6l/r+KxYYz3 | ||
| 107 | +1pcGpPvRmPh0DJm7cPTiXqPnZcPt+ulSaSdlxmd19OnvG5awp0fXhxryZVwuiT8G | ||
| 108 | +VDkhyARrxYrdjlINsZJZbQjO0t8ketXAELJOnbFXXzeCOosyOHkLwsqOO96AVJA8 | ||
| 109 | +45ZVL5m95ClGy0RSrjVIkXsxTAMVG6SPAqKwk6vmTdRGuSPS4rhgckPVDHmccmuq | ||
| 110 | +dfnT2YkX+wB2/M3oCgU+s30fAHGkbGZ0pCdNbFYFZLiH0iiMbTDl/0L/z7IdK0nH | ||
| 111 | +GLHVE7apPraKC6xl6rPWsD2iSfrmtIPQa0+rqbIVvKP5JdfJ8J4alI+OxFw/znQe | ||
| 112 | +V0/Rez0j22Fe119LZFFSXhRv+ZSvcq20xDwh00mzcumPWpYuCVPozA18yIhC9tNn | ||
| 113 | +ALHndz0tDseIdy9vC71jQWy9iwri3ueN0DekMMF8JGzI1Z6BAFzgyAx3DkHtwHg7 | ||
| 114 | +B7qD0jPG5hJ5+yt323fYgJsuEAYoZ8/jzZ01pkX8bt+UsVN0DGnSGsI2ktnIIk3J | ||
| 115 | +l+8krjmUy6EaW79nITwoOqaeHOIp8m3UkjEcoKOYrzHRKqRy+A09rY+m/cAQaafW | ||
| 116 | +4xp0Zv7qZPLwnu0jsqB4jD8Ll9yPB02ndsoV6U5PeHzTkVhPml19jKUAwFfs7TJg | ||
| 117 | +kXy+/xFhYVUCAwEAATANBgkqhkiG9w0BAQsFAAOCBAIAAQnZY77pMNeypfpba2WK | ||
| 118 | +aDasT7dk2JqP0eukJCVPTN24Zca+xJNPdzuBATm/8SdZK9lddIbjSnWRsKvTnO2r | ||
| 119 | +/rYdlPf3jM5uuJtb8+Uwwe1s+gszelGS9G/lzzq+ehWicRIq2PFcs8o3iQMfENiv | ||
| 120 | +qILJ+xjcrvms5ZPDNahWkfRx3KCg8Q+/at2n5p7XYjMPYiLKHnDC+RE2b1qT20IZ | ||
| 121 | +FhuK/fTWLmKbfYFNNga6GC4qcaZJ7x0pbm4SDTYp0tkhzcHzwKhidfNB5J2vNz6l | ||
| 122 | +Ur6wiYwamFTLqcOwWo7rdvI+sSn05WQBv0QZlzFX+OAu0l7WQ7yU+noOxBhjvHds | ||
| 123 | +14+r9qcQZg2q9kG+evopYZqYXRUNNlZKo9MRBXhfrISulFAc5lRFQIXMXnglvAu+ | ||
| 124 | +Ipz2gomEAOcOPNNVldhKAU94GAMJd/KfN0ZP7gX3YvPzuYU6XDhag5RTohXLm18w | ||
| 125 | +5AF+ES3DOQ6ixu3DTf0D+6qrDuK+prdX8ivcdTQVNOQ+MIZeGSc6NWWOTaMGJ3lg | ||
| 126 | +aZIxJUGdo6E7GBGiC1YTjgFKFbHzek1LRTh/LX3vbSudxwaG0HQxwsU9T4DWiMqa | ||
| 127 | +Fkf2KteLEUA6HrR+0XlAZrhwoqAmrJ+8lCFX3V0gE9lpENfVHlFXDGyx10DpTB28 | ||
| 128 | +DdjnY3F7EPWNzwf9P3oNT69CKW3Bk6VVr3ROOJtDxVu1ioWo3TaXltQ0VOnap2Pu | ||
| 129 | +sa5wfrpfwBDuAS9JCDg4ttNp2nW3F7tgXC6xPqw5pvGwUppEw9XNrqV8TZrxduuv | ||
| 130 | +rQ3NyZ7KSzIpmFlD3UwV/fGfz3UQmHS6Ng1evrUID9DjfYNfRqSGIGjDfxGtYD+j | ||
| 131 | +Z1gLJZuhjJpNtwBkKRtlNtrCWCJK2hidK/foxwD7kwAPo2I9FjpltxCRywZUs07X | ||
| 132 | +KwXTfBR9v6ij1LV6K58hFS+8ezZyZ05CeVBFkMQdclTOSfuPxlMkQOtjp8QWDj+F | ||
| 133 | +j/MYziT5KBkHvcbrjdRtUJIAi4N7zCsPZtjik918AK1WBNRVqPbrgq/XSEXMfuvs | ||
| 134 | +6JbfK0B76vdBDRtJFC1JsvnIrGbUztxXzyQwFLaR/AjVJqpVlysLWzPKWVX6/+SJ | ||
| 135 | +u1NQOl2E8P6ycyBsuGnO89p0S4F8cMRcI2X1XQsZ7/q0NBrOMaEp5T3SrWo9GiQ3 | ||
| 136 | +o2SBdbs3Y6MBPBtTu977Z/0RO63J3M5i2tjUiDfrFy7+VRLKr7qQ7JibohyB8QaR | ||
| 137 | +9tedgjn2f+of7PnP/PEl1cCphUZeHM7QKUMPT8dbqwmKtlYY43EHXcvNOT5IBk3X | ||
| 138 | +9lwJoZk/B2i+ZMRNSP34ztAwtxmasPt6RAWGQpWCn9qmttAHAnMfDqe7F7jVR6rS | ||
| 139 | +u58= | ||
| 140 | +-----END CERTIFICATE-----` | ||
| 141 | + | ||
| 142 | +func TestHandshakeRSATooBig(t *testing.T) { | ||
| 143 | + testCert, _ := pem.Decode([]byte(largeRSAKeyCertPEM)) | ||
| 144 | + | ||
| 145 | + c := &Conn{conn: &discardConn{}, config: testConfig.Clone()} | ||
| 146 | + | ||
| 147 | + expectedErr := "tls: server sent certificate containing RSA key larger than 8192 bits" | ||
| 148 | + err := c.verifyServerCertificate([][]byte{testCert.Bytes}) | ||
| 149 | + if err == nil || err.Error() != expectedErr { | ||
| 150 | + t.Errorf("Conn.verifyServerCertificate unexpected error: want %q, got %q", expectedErr, err) | ||
| 151 | + } | ||
| 152 | + | ||
| 153 | + expectedErr = "tls: client sent certificate containing RSA key larger than 8192 bits" | ||
| 154 | + err = c.processCertsFromClient(Certificate{Certificate: [][]byte{testCert.Bytes}}) | ||
| 155 | + if err == nil || err.Error() != expectedErr { | ||
| 156 | + t.Errorf("Conn.processCertsFromClient unexpected error: want %q, got %q", expectedErr, err) | ||
| 157 | + } | ||
| 158 | +} | ||
| 159 | diff --git a/src/crypto/tls/handshake_server.go b/src/crypto/tls/handshake_server.go | ||
| 160 | index 8d51e7e..a5d8f4a 100644 | ||
| 161 | --- a/src/crypto/tls/handshake_server.go | ||
| 162 | +++ b/src/crypto/tls/handshake_server.go | ||
| 163 | @@ -812,6 +812,10 @@ func (c *Conn) processCertsFromClient(certificate Certificate) error { | ||
| 164 | c.sendAlert(alertBadCertificate) | ||
| 165 | return errors.New("tls: failed to parse client certificate: " + err.Error()) | ||
| 166 | } | ||
| 167 | + if certs[i].PublicKeyAlgorithm == x509.RSA && certs[i].PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize { | ||
| 168 | + c.sendAlert(alertBadCertificate) | ||
| 169 | + return fmt.Errorf("tls: client sent certificate containing RSA key larger than %d bits", maxRSAKeySize) | ||
| 170 | + } | ||
| 171 | } | ||
| 172 | |||
| 173 | if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) { | ||
| 174 | -- | ||
| 175 | 2.40.0 | ||
