CVE-2022-30635,CVE-2022-30632,CVE-2022-28131, CVE-2022-30631,CVE-2022-30629,CVE-2022-30634 Conflict: CVE-2022-1962: src/go/parser/parser.go CVE-2022-1705: src/net/http/transfer.go CVE-2022-30634: src/crypto/rand/rand.go, src/crypto/rand/rand_windows.go Score: CVE-2022-32148: 5.3 CVE-2022-1962: 6.2 CVE-2022-1705: 5.3 CVE-2022-30633: 6.2 CVE-2022-30635: 5.5 CVE-2022-30632: 6.2 CVE-2022-28131: 6.2 CVE-2022-30631: 7.5 CVE-2022-30629: 2.6 CVE-2022-30634: 7.5 Reference: CVE-2022-32148: https://go-review.googlesource.com/c/go/+/415221 CVE-2022-1962: https://go-review.googlesource.com/c/go/+/417070 CVE-2022-1705: https://go-review.googlesource.com/c/go/+/415217 CVE-2022-30633: https://go-review.googlesource.com/c/go/+/417069 CVE-2022-30635: https://go-review.googlesource.com/c/go/+/417074 CVE-2022-30632: https://go-review.googlesource.com/c/go/+/417073 CVE-2022-28131: https://go-review.googlesource.com/c/go/+/417068 CVE-2022-30631: https://go-review.googlesource.com/c/go/+/417071 CVE-2022-30629: https://go-review.googlesource.com/c/go/+/408574 CVE-2022-30634: https://go-review.googlesource.com/c/go/+/406635 Reason: fix CVE CVE-2022-32148: 0064-release-branch.go1.17-net-http-preserve-nil-values-i.patch CVE-2022-1962: 0065-release-branch.go1.17-go-parser-limit-recursion-dept.patch CVE-2022-1705: 0066-release-branch.go1.17-net-http-don-t-strip-whitespac.patch CVE-2022-30633: 0067-release-branch.go1.17-encoding-xml-limit-depth-of-ne.patch CVE-2022-30635: 0068-release-branch.go1.17-encoding-gob-add-a-depth-limit.patch CVE-2022-30632: 0069-release-branch.go1.17-path-filepath-fix-stack-exhaus.patch CVE-2022-28131: 0070-release-branch.go1.17-encoding-xml-use-iterative-Ski.patch CVE-2022-30631: 0071-release-branch.go1.17-compress-gzip-fix-stack-exhaus.patch CVE-2022-30629: 0072-release-branch.go1.17-crypto-tls-randomly-generate-t.patch CVE-2022-30634: 0073-release-branch.go1.17-crypto-rand-properly-handle-la.patch
240 lines
7.6 KiB
Diff
240 lines
7.6 KiB
Diff
From 4dfd37e5c41d531b9e5eb9618a0683d67ef3e594 Mon Sep 17 00:00:00 2001
|
|
From: Roland Shoemaker <roland@golang.org>
|
|
Date: Mon, 25 Apr 2022 19:02:35 -0700
|
|
Subject: [PATCH 10/10] [release-branch.go1.17] crypto/rand: properly handle
|
|
large Read on windows
|
|
|
|
Use the batched reader to chunk large Read calls on windows to a max of
|
|
1 << 31 - 1 bytes. This prevents an infinite loop when trying to read
|
|
more than 1 << 32 -1 bytes, due to how RtlGenRandom works.
|
|
|
|
This change moves the batched function from rand_unix.go to rand.go,
|
|
since it is now needed for both windows and unix implementations.
|
|
|
|
Updates #52561
|
|
Fixes #52932
|
|
Fixes CVE-2022-30634
|
|
|
|
Change-Id: Id98fc4b1427e5cb2132762a445b2aed646a37473
|
|
Reviewed-on: https://go-review.googlesource.com/c/go/+/402257
|
|
Run-TryBot: Roland Shoemaker <roland@golang.org>
|
|
Reviewed-by: Filippo Valsorda <filippo@golang.org>
|
|
Reviewed-by: Filippo Valsorda <valsorda@google.com>
|
|
TryBot-Result: Gopher Robot <gobot@golang.org>
|
|
(cherry picked from commit bb1f4416180511231de6d17a1f2f55c82aafc863)
|
|
Reviewed-on: https://go-review.googlesource.com/c/go/+/406635
|
|
Reviewed-by: Damien Neil <dneil@google.com>
|
|
|
|
Conflict: src/crypto/rand/rand.go, src/crypto/rand/rand_windows.go
|
|
Reference: https://go-review.googlesource.com/c/go/+/406635
|
|
---
|
|
src/crypto/rand/rand.go | 18 +++++++++++++++
|
|
src/crypto/rand/rand_batched.go | 22 +++++--------------
|
|
src/crypto/rand/rand_batched_test.go | 21 +++++++++---------
|
|
src/crypto/rand/rand_unix.go | 4 ++--
|
|
src/crypto/rand/rand_windows.go | 33 +++++-----------------------
|
|
5 files changed, 43 insertions(+), 55 deletions(-)
|
|
|
|
diff --git a/src/crypto/rand/rand.go b/src/crypto/rand/rand.go
|
|
index a5ccd19de32..5606f248f02 100644
|
|
--- a/src/crypto/rand/rand.go
|
|
+++ b/src/crypto/rand/rand.go
|
|
@@ -27,3 +27,21 @@ func Read(b []byte) (n int, err error) {
|
|
func warnBlocked() {
|
|
println("crypto/rand: blocked for 60 seconds waiting to read random data from the kernel")
|
|
}
|
|
+
|
|
+// batched returns a function that calls f to populate a []byte by chunking it
|
|
+// into subslices of, at most, readMax bytes.
|
|
+func batched(f func([]byte) error, readMax int) func([]byte) error {
|
|
+ return func(out []byte) error {
|
|
+ for len(out) > 0 {
|
|
+ read := len(out)
|
|
+ if read > readMax {
|
|
+ read = readMax
|
|
+ }
|
|
+ if err := f(out[:read]); err != nil {
|
|
+ return err
|
|
+ }
|
|
+ out = out[read:]
|
|
+ }
|
|
+ return nil
|
|
+ }
|
|
+}
|
|
diff --git a/src/crypto/rand/rand_batched.go b/src/crypto/rand/rand_batched.go
|
|
index 60267fd4bc2..cad958d79c0 100644
|
|
--- a/src/crypto/rand/rand_batched.go
|
|
+++ b/src/crypto/rand/rand_batched.go
|
|
@@ -7,6 +7,7 @@
|
|
package rand
|
|
|
|
import (
|
|
+ "errors"
|
|
"internal/syscall/unix"
|
|
)
|
|
|
|
@@ -15,20 +16,6 @@ func init() {
|
|
altGetRandom = batched(getRandomBatch, maxGetRandomRead)
|
|
}
|
|
|
|
-// batched returns a function that calls f to populate a []byte by chunking it
|
|
-// into subslices of, at most, readMax bytes.
|
|
-func batched(f func([]byte) bool, readMax int) func([]byte) bool {
|
|
- return func(buf []byte) bool {
|
|
- for len(buf) > readMax {
|
|
- if !f(buf[:readMax]) {
|
|
- return false
|
|
- }
|
|
- buf = buf[readMax:]
|
|
- }
|
|
- return len(buf) == 0 || f(buf)
|
|
- }
|
|
-}
|
|
-
|
|
// If the kernel is too old to support the getrandom syscall(),
|
|
// unix.GetRandom will immediately return ENOSYS and we will then fall back to
|
|
// reading from /dev/urandom in rand_unix.go. unix.GetRandom caches the ENOSYS
|
|
@@ -36,7 +23,10 @@ func batched(f func([]byte) bool, readMax int) func([]byte) bool {
|
|
// If the kernel supports the getrandom() syscall, unix.GetRandom will block
|
|
// until the kernel has sufficient randomness (as we don't use GRND_NONBLOCK).
|
|
// In this case, unix.GetRandom will not return an error.
|
|
-func getRandomBatch(p []byte) (ok bool) {
|
|
+func getRandomBatch(p []byte) error {
|
|
n, err := unix.GetRandom(p, 0)
|
|
- return n == len(p) && err == nil
|
|
+ if n != len(p) {
|
|
+ return errors.New("short read")
|
|
+ }
|
|
+ return err
|
|
}
|
|
diff --git a/src/crypto/rand/rand_batched_test.go b/src/crypto/rand/rand_batched_test.go
|
|
index 837db83f770..8122bceba4b 100644
|
|
--- a/src/crypto/rand/rand_batched_test.go
|
|
+++ b/src/crypto/rand/rand_batched_test.go
|
|
@@ -8,20 +8,21 @@ package rand
|
|
|
|
import (
|
|
"bytes"
|
|
+ "errors"
|
|
"testing"
|
|
)
|
|
|
|
func TestBatched(t *testing.T) {
|
|
- fillBatched := batched(func(p []byte) bool {
|
|
+ fillBatched := batched(func(p []byte) error {
|
|
for i := range p {
|
|
p[i] = byte(i)
|
|
}
|
|
- return true
|
|
+ return nil
|
|
}, 5)
|
|
|
|
p := make([]byte, 13)
|
|
- if !fillBatched(p) {
|
|
- t.Fatal("batched function returned false")
|
|
+ if err := fillBatched(p); err != nil {
|
|
+ t.Fatalf("batched function returned error: %s", err)
|
|
}
|
|
expected := []byte{0, 1, 2, 3, 4, 0, 1, 2, 3, 4, 0, 1, 2}
|
|
if !bytes.Equal(expected, p) {
|
|
@@ -30,15 +31,15 @@ func TestBatched(t *testing.T) {
|
|
}
|
|
|
|
func TestBatchedError(t *testing.T) {
|
|
- b := batched(func(p []byte) bool { return false }, 5)
|
|
- if b(make([]byte, 13)) {
|
|
- t.Fatal("batched function should have returned false")
|
|
+ b := batched(func(p []byte) error { return errors.New("") }, 5)
|
|
+ if b(make([]byte, 13)) == nil {
|
|
+ t.Fatal("batched function should have returned an error")
|
|
}
|
|
}
|
|
|
|
func TestBatchedEmpty(t *testing.T) {
|
|
- b := batched(func(p []byte) bool { return false }, 5)
|
|
- if !b(make([]byte, 0)) {
|
|
- t.Fatal("empty slice should always return true")
|
|
+ b := batched(func(p []byte) error { return errors.New("") }, 5)
|
|
+ if err := b(make([]byte, 0)); err != nil {
|
|
+ t.Fatalf("empty slice should always return nil: %s", err)
|
|
}
|
|
}
|
|
diff --git a/src/crypto/rand/rand_unix.go b/src/crypto/rand/rand_unix.go
|
|
index 0610f691b0d..5ddc76be266 100644
|
|
--- a/src/crypto/rand/rand_unix.go
|
|
+++ b/src/crypto/rand/rand_unix.go
|
|
@@ -45,7 +45,7 @@ type devReader struct {
|
|
|
|
// altGetRandom if non-nil specifies an OS-specific function to get
|
|
// urandom-style randomness.
|
|
-var altGetRandom func([]byte) (ok bool)
|
|
+var altGetRandom func([]byte) (err error)
|
|
|
|
func (r *devReader) Read(b []byte) (n int, err error) {
|
|
if atomic.CompareAndSwapInt32(&r.used, 0, 1) {
|
|
@@ -54,7 +54,7 @@ func (r *devReader) Read(b []byte) (n int, err error) {
|
|
t := time.AfterFunc(60*time.Second, warnBlocked)
|
|
defer t.Stop()
|
|
}
|
|
- if altGetRandom != nil && r.name == urandomDevice && altGetRandom(b) {
|
|
+ if altGetRandom != nil && r.name == urandomDevice && altGetRandom(b) == nil {
|
|
return len(b), nil
|
|
}
|
|
r.mu.Lock()
|
|
diff --git a/src/crypto/rand/rand_windows.go b/src/crypto/rand/rand_windows.go
|
|
index 78a4ed6d67b..b5036ba9713 100644
|
|
--- a/src/crypto/rand/rand_windows.go
|
|
+++ b/src/crypto/rand/rand_windows.go
|
|
@@ -8,11 +8,9 @@
|
|
package rand
|
|
|
|
import (
|
|
- "os"
|
|
+ "internal/syscall/windows"
|
|
"sync"
|
|
- "sync/atomic"
|
|
"syscall"
|
|
- "time"
|
|
)
|
|
|
|
// Implemented by using Windows CryptoAPI 2.0.
|
|
@@ -27,30 +25,11 @@ type rngReader struct {
|
|
}
|
|
|
|
func (r *rngReader) Read(b []byte) (n int, err error) {
|
|
- if atomic.CompareAndSwapInt32(&r.used, 0, 1) {
|
|
- // First use of randomness. Start timer to warn about
|
|
- // being blocked on entropy not being available.
|
|
- t := time.AfterFunc(60*time.Second, warnBlocked)
|
|
- defer t.Stop()
|
|
- }
|
|
- r.mu.Lock()
|
|
- if r.prov == 0 {
|
|
- const provType = syscall.PROV_RSA_FULL
|
|
- const flags = syscall.CRYPT_VERIFYCONTEXT | syscall.CRYPT_SILENT
|
|
- err := syscall.CryptAcquireContext(&r.prov, nil, nil, provType, flags)
|
|
- if err != nil {
|
|
- r.mu.Unlock()
|
|
- return 0, os.NewSyscallError("CryptAcquireContext", err)
|
|
- }
|
|
- }
|
|
- r.mu.Unlock()
|
|
-
|
|
- if len(b) == 0 {
|
|
- return 0, nil
|
|
- }
|
|
- err = syscall.CryptGenRandom(r.prov, uint32(len(b)), &b[0])
|
|
- if err != nil {
|
|
- return 0, os.NewSyscallError("CryptGenRandom", err)
|
|
+ // RtlGenRandom only returns 1<<32-1 bytes at a time. We only read at
|
|
+ // most 1<<31-1 bytes at a time so that this works the same on 32-bit
|
|
+ // and 64-bit systems.
|
|
+ if err := batched(windows.RtlGenRandom, 1<<31-1)(b); err != nil {
|
|
+ return 0, err
|
|
}
|
|
return len(b), nil
|
|
}
|
|
--
|
|
2.30.2
|
|
|