]> Cypherpunks repositories - gostls13.git/commitdiff
[release-branch.go1.12-security] crypto/dsa: prevent bad public keys from causing...
authorKatie Hockman <katie@golang.org>
Mon, 14 Oct 2019 20:42:21 +0000 (16:42 -0400)
committerKatie Hockman <katiehockman@google.com>
Wed, 16 Oct 2019 21:24:47 +0000 (21:24 +0000)
dsa.Verify might currently use a nil s inverse in a
multiplication if the public key contains a non-prime Q,
causing a panic. Change this to check that the mod
inverse exists before using it.

Fixes CVE-2019-17596

Change-Id: I94d5f3cc38f1b5d52d38dcb1d253c71b7fd1cae7
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/572809
Reviewed-by: Filippo Valsorda <valsorda@google.com>
(cherry picked from commit 9119dfb0511326d4485b248b83d4fde19c95d0f7)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/575232

src/crypto/dsa/dsa.go

index 575314b1b468908c3bb197ac656e368cb1f5e701..2fc4f1f05bfb09483e60882ff79bb5fd738f7c21 100644 (file)
@@ -279,6 +279,9 @@ func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool {
        }
 
        w := new(big.Int).ModInverse(s, pub.Q)
+       if w == nil {
+               return false
+       }
 
        n := pub.Q.BitLen()
        if n&7 != 0 {