Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04YzM3LTdxeDMtNGM0cM4AA1Lt

Blst has logical error in SigValidate in Go bindings

Impact

Blst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to SigValidate in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.

Description

The vulnerable function is declared as SigValidate(sigInfcheck bool) bool and if called with sigInfcheck argument set to true, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.

It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as Verify, AggregateVerify, etc., as well as signature aggregation methods, such as PairingAggregate*. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.

Patches

This issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.

Credits

A special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.

Permalink: https://github.com/advisories/GHSA-8c37-7qx3-4c4p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04YzM3LTdxeDMtNGM0cM4AA1Lt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 8 months ago


Identifiers: GHSA-8c37-7qx3-4c4p
References: Repository: https://github.com/supranational/blst
Blast Radius: 0.0

Affected Packages

go:github.com/supranational/blst
Dependent packages: 715
Dependent repositories: 1,043
Downloads:
Affected Version Ranges: >= 0.3.0, < 0.3.11
Fixed in: 0.3.11
All affected versions: 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8, 0.3.10
All unaffected versions: 0.1.0, 0.1.1, 0.2.0, 0.3.11