Bug 1763310 (CVE-2019-17596) - CVE-2019-17596 golang: invalid public key causes panic in dsa.Verify
Summary: CVE-2019-17596 golang: invalid public key causes panic in dsa.Verify
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-17596
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1883645 1763311 1763312 1763977 1763978 1773500 1773501 1785346 1785389 1785664 1793812
Blocks: 1763314
TreeView+ depends on / blocked
 
Reported: 2019-10-18 18:13 UTC by kat
Modified: 2023-02-07 17:07 UTC (History)
43 users (show)

Fixed In Version: go 1.13.2, go 1.12.11
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-01-14 14:09:33 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:0101 0 None None None 2020-01-14 08:44:25 UTC
Red Hat Product Errata RHSA-2020:0329 0 None None None 2020-02-04 10:35:50 UTC

Description kat 2019-10-18 18:13:50 UTC
As announced by Go upstream on 2019-10-17: Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don’t chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected.

Moreover, an application might crash invoking crypto/x509.(*CertificateRequest) CheckSignature on an X.509 certificate request, parsing a golang.org/x/crypto/openpgp Entity, or during a golang.org/x/crypto/otr conversation. Finally, a golang.org/x/crypto/ssh client can panic due to a malformed host key, while a server could panic if either PublicKeyCallback accepts a malformed public key, or if IsUserAuthority accepts a certificate with a malformed public key.

Upstream bug:
https://github.com/golang/go/issues/34960

Comment 1 kat 2019-10-18 18:14:03 UTC
Created golang tracking bugs for this issue:

Affects: epel-all [bug 1763311]
Affects: fedora-all [bug 1763312]

Comment 4 Huzaifa S. Sidhpurwala 2019-10-22 06:11:31 UTC
Analysis:

This is essentially a crash caused when verifying specially crafted DSA public certificates. As per upstream: "Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don’t chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected."

Similarly checking signatures on specially crafted  X.509 certificates, or verifying specially crafted ssh host keys may also cause a crash.

Comment 5 Huzaifa S. Sidhpurwala 2019-10-22 06:39:12 UTC
External References:

https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ

Comment 7 errata-xmlrpc 2020-01-14 08:44:22 UTC
This issue has been addressed in the following products:

  Red Hat Developer Tools

Via RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0101

Comment 8 Product Security DevOps Team 2020-01-14 14:09:33 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-17596

Comment 9 errata-xmlrpc 2020-02-04 10:35:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0329


Note You need to log in before you can comment on or make changes to this bug.