]> Cypherpunks.ru repositories - gostls13.git/commitdiff
[release-branch.go1.22] crypto/x509: make sure pub key is non-nil before interface...
authorRoland Shoemaker <bracewell@google.com>
Thu, 18 Jan 2024 20:51:13 +0000 (12:51 -0800)
committerGopher Robot <gobot@golang.org>
Tue, 5 Mar 2024 16:43:45 +0000 (16:43 +0000)
alreadyInChain assumes all keys fit a interface which contains the
Equal method (which they do), but this ignores that certificates may
have a nil key when PublicKeyAlgorithm is UnknownPublicKeyAlgorithm. In
this case alreadyInChain panics.

Check that the key is non-nil as part of considerCandidate (we are never
going to build a chain containing UnknownPublicKeyAlgorithm anyway).

For #65390
Fixes #65831
Fixes CVE-2024-24783

Change-Id: Ibdccc0a487e3368b6812be35daad2512220243f3
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2137282
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Roland Shoemaker <bracewell@google.com>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2174343
Reviewed-by: Carlos Amedee <amedee@google.com>
Reviewed-by: Roland Shoemaker <bracewell@google.com>
Reviewed-on: https://go-review.googlesource.com/c/go/+/569235
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Auto-Submit: Michael Knyszek <mknyszek@google.com>
Reviewed-by: Carlos Amedee <carlos@golang.org>
src/crypto/x509/verify.go
src/crypto/x509/verify_test.go

index 9d3c3246d3098dc474ed1f0b49db3ee316fe9b6c..6efbff28bf7b6e997988c46a8197b6f7b1430c5d 100644 (file)
@@ -899,7 +899,7 @@ func (c *Certificate) buildChains(currentChain []*Certificate, sigChecks *int, o
        )
 
        considerCandidate := func(certType int, candidate potentialParent) {
-               if alreadyInChain(candidate.cert, currentChain) {
+               if candidate.cert.PublicKey == nil || alreadyInChain(candidate.cert, currentChain) {
                        return
                }
 
index 861d2b389064ba5586001b46d4185957d524cc88..8a7a5f6e2c6d457191afdb733af496d323268d64 100644 (file)
@@ -2792,3 +2792,22 @@ func TestVerifyEKURootAsLeaf(t *testing.T) {
        }
 
 }
+
+func TestVerifyNilPubKey(t *testing.T) {
+       c := &Certificate{
+               RawIssuer:      []byte{1, 2, 3},
+               AuthorityKeyId: []byte{1, 2, 3},
+       }
+       opts := &VerifyOptions{}
+       opts.Roots = NewCertPool()
+       r := &Certificate{
+               RawSubject:   []byte{1, 2, 3},
+               SubjectKeyId: []byte{1, 2, 3},
+       }
+       opts.Roots.AddCert(r)
+
+       _, err := c.buildChains([]*Certificate{r}, nil, opts)
+       if _, ok := err.(UnknownAuthorityError); !ok {
+               t.Fatalf("buildChains returned unexpected error, got: %v, want %v", err, UnknownAuthorityError{})
+       }
+}