Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x509: CPU denial of service in chain validation[CVE-2018-16875] #317

Closed
wants to merge 1 commit into from

Conversation

zouyee
Copy link

@zouyee zouyee commented Dec 14, 2018

From golang/go#29233

Package crypto/x509 parses and validates X.509-encoded keys and certificates. It's supposed to handle certificate chains provided by an attacker with reasonable resource use.

The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients verifying certificates are affected.

Go 1.11.3 and 1.10.6 have been released with this fixed.

@knative-prow-robot knative-prow-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Dec 14, 2018
@knative-prow-robot knative-prow-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Dec 14, 2018
@zouyee
Copy link
Author

zouyee commented Dec 15, 2018

/assign @mattmoor

@knative-prow-robot knative-prow-robot added the lgtm Indicates that a PR is ready to be merged. label Dec 16, 2018
Copy link
Member

@mattmoor mattmoor left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@mattmoor
Copy link
Member

/ok-to-test
/assign @adrcunha

@knative-prow-robot knative-prow-robot removed the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Dec 16, 2018
@adrcunha
Copy link
Contributor

adrcunha commented Dec 16, 2018

/hold

Thanks, @zouyee. We don't have any running go server in test-infra so we're good. The only tools built are for testing, and #317 is a superset of this change (only changing the go version won't work, that's why the build tests are failing for this PR).

@knative-prow-robot knative-prow-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Dec 16, 2018
@knative-prow-robot
Copy link
Collaborator

New changes are detected. LGTM label has been removed.

@knative-prow-robot knative-prow-robot removed the lgtm Indicates that a PR is ready to be merged. label Dec 18, 2018
@knative-prow-robot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: mattmoor, zouyee
To fully approve this pull request, please assign additional approvers.
We suggest the following additional approver: adrcunha

If they are not already assigned, you can assign the PR to them by writing /assign @adrcunha in a comment when ready.

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@zouyee
Copy link
Author

zouyee commented Dec 18, 2018

/ok-to-test

@mattmoor mattmoor removed their assignment Dec 18, 2018
@zouyee
Copy link
Author

zouyee commented Dec 18, 2018

@adrcunha @mattmoor PTAL

@adrcunha
Copy link
Contributor

I still prefer #319 over this one, because that also keeps the external repository definitions in sync with the kubernetes/test-infra repo (from where the config checkers are built).

@zouyee zouyee closed this Dec 18, 2018
@zouyee zouyee deleted the patch-1 branch December 18, 2018 08:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants