CVE-2025-68121:Go TLS 会话恢复的回归与修复不完整问题
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。我得先仔细看看这篇文章的内容。 这篇文章是关于Go编程语言的安全漏洞修复的。作者Coia Prant指出,官方修复存在严重问题,导致网络生态系统崩溃,特别是影响了quic-go。问题主要在于官方错误地将漏洞归因于API误用,而实际是TLS 1.3状态机中的逻辑错误。修复补丁不仅有错误,还破坏了Config.Clone逻辑,导致0-RTT和会话恢复失效。作者提出了一个更优雅的解决方案,并建议下游维护者审查后再部署。 现在我需要把这些信息浓缩到100字以内。首先确定关键点:Go的安全漏洞、官方修复的问题、根本原因、补丁的缺陷以及提出的解决方案。 可能的结构:Go的安全漏洞修复存在严重问题,导致网络生态系统崩溃,特别是quic-go。官方错误归因于API误用,实际是TLS 1.3状态机中的逻辑错误。补丁有误且破坏了Config.Clone逻辑,影响性能和功能。作者提出更优雅的解决方案,并建议审查后再部署。 检查字数是否在限制内,并确保信息准确传达。 </think> Go编程语言的安全漏洞修复存在严重问题,导致网络生态系统崩溃(如quic-go)。官方错误归因于API误用,实际是TLS 1.3状态机中的逻辑错误。补丁存在缺陷且破坏性能与功能。作者提出更优雅的解决方案并建议审查后再部署。 2026-1-17 19:48:0 Author: seclists.org(查看原文) 阅读量:1 收藏

oss-sec logo

oss-sec mailing list archives


From: Coia Prant <coiaprant () gmail com>
Date: Sun, 18 Jan 2026 00:20:04 +0800

Hi,

I am the original reporter of the vulnerabilities recently addressed
in Go 1.25.6/1.24.x (CVE-2025-61730, CVE-2025-68121).

I am writing to inform the community that the official fix provided by
the Go security team is critically flawed and causes significant
regressions in the networking ecosystem (notably breaking quic-go).

1. Missing Root Cause in Official Advisory

The official advisory attributes the risk to "misuse of APIs," but the
root cause is a fundamental logic error in Go's TLS 1.3 state machine
during session resumption.

Specifically, it fails to re-validate the identity of the trust anchor
when a session is resumed, allowing for Cross-CA certificate bypass.

2. Flawed Patch Implementation

The current official patch (CL 735051) contains amateurish errors that
undermine its effectiveness:

Incorrect Indexing: It attempts to verify peerCertificates instead of
the verifiedChain (that include RootCA).

Ecosystem Breakage: By aggressively blocking Config.Clone logic to
"fix" the issue, it has paralyzed 0-RTT and session resumption in the
QUIC ecosystem.

3. Proposed O(1) Solution

I have proposed a far more elegant solution that performs a
constant-time SHA-224 fingerprint check of the root CA.

This fixes the vulnerability without breaking the Config.Clone
semantics or performance.

Details and Discussion:

https://github.com/golang/go/issues/77217

I encourage downstream maintainers (SUSE, Red Hat, Debian) to review
the fix before deploying it to mission-critical infrastructure.

Best regards,
Coia Prant (rbqvq)


Current thread:


文章来源: https://seclists.org/oss-sec/2026/q1/83
如有侵权请联系:admin#unsafe.sh