|
|
Message-ID: <CALj3r0jnYcmJ9-ymGs1X3_t7=9OV6UbvVJ7nmiuXpfe+9yN9Tg@mail.gmail.com> Date: Sun, 18 Jan 2026 00:20:04 +0800 From: Coia Prant <coiaprant@...il.com> To: oss-security@...ts.openwall.com, security@...e.com, team@...urity.debian.org, secalert@...hat.com Subject: CVE-2025-68121: Regression and Incomplete Fix for Go TLS Session Resumption Hi, I am the original reporter of the vulnerabilities recently addressed in Go 1.25.6/1.24.x (CVE-2025-61730, CVE-2025-68121). I am writing to inform the community that the official fix provided by the Go security team is critically flawed and causes significant regressions in the networking ecosystem (notably breaking quic-go). 1. Missing Root Cause in Official Advisory The official advisory attributes the risk to "misuse of APIs," but the root cause is a fundamental logic error in Go's TLS 1.3 state machine during session resumption. Specifically, it fails to re-validate the identity of the trust anchor when a session is resumed, allowing for Cross-CA certificate bypass. 2. Flawed Patch Implementation The current official patch (CL 735051) contains amateurish errors that undermine its effectiveness: Incorrect Indexing: It attempts to verify peerCertificates instead of the verifiedChain (that include RootCA). Ecosystem Breakage: By aggressively blocking Config.Clone logic to "fix" the issue, it has paralyzed 0-RTT and session resumption in the QUIC ecosystem. 3. Proposed O(1) Solution I have proposed a far more elegant solution that performs a constant-time SHA-224 fingerprint check of the root CA. This fixes the vulnerability without breaking the Config.Clone semantics or performance. Details and Discussion: https://github.com/golang/go/issues/77217 I encourage downstream maintainers (SUSE, Red Hat, Debian) to review the fix before deploying it to mission-critical infrastructure. Best regards, Coia Prant (rbqvq)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.