Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/supranational/blst
  4. ›
  5. GMS-2023-1837

GMS-2023-1837: Blst has logical error in SigValidate in Go bindings

August 9, 2023 (updated September 21, 2023)

Impact

Blst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to SigValidate in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub does not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.

Description

The vulnerable function is declared as SigValidate(sigInfcheck bool) bool and if called with sigInfcheck argument set to true, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.

It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as Verify, AggregateVerify, etc., as well as signature aggregation methods, such as PairingAggregate*. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it’s performed.

Patches

This issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.

Credits

A special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.

References

  • github.com/advisories/GHSA-8c37-7qx3-4c4p
  • github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b
  • github.com/supranational/blst/releases/tag/v0.3.11
  • github.com/supranational/blst/security/advisories/GHSA-8c37-7qx3-4c4p

Code Behaviors & Features

Detect and mitigate GMS-2023-1837 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.3.0 before 0.3.11

Fixed versions

  • v0.3.11

Solution

Upgrade to version 0.3.11 or above.

Source file

go/github.com/supranational/blst/GMS-2023-1837.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.