Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Side-channel proofing PKCS#1 1.5 paths (CVE-2023-6258) #308

Merged
merged 1 commit into from
Nov 28, 2023

Conversation

simo5
Copy link
Member

@simo5 simo5 commented Nov 14, 2023

Fixes for CVE-2023-6258 (Marvin)

@simo5 simo5 force-pushed the pkcs1_marvin branch 3 times, most recently from 5a7643e to a2c4b09 Compare November 14, 2023 19:36
src/asymmetric_cipher.c Outdated Show resolved Hide resolved
@tomato42
Copy link

tomato42 commented Nov 15, 2023

Just to be explicit: the "approved" status is because they look fine, not because I've verified them to be side-channel free.

@simo5
Copy link
Member Author

simo5 commented Nov 15, 2023

Just to be explicit: the "approved" status is because they look fine, not because I've verified them to be side-channel free.

That was understood,
thank you!

@tomato42
Copy link

this issue was assigned CVE-2023-6258

@simo5 simo5 changed the title Side-channel proofing PKCS#1 1.5 paths Side-channel proofing PKCS#1 1.5 paths (CVE-2023-6258) Nov 22, 2023
@simo5
Copy link
Member Author

simo5 commented Nov 28, 2023

Merging this now that debian fixes are in and all tests pass, macos softoken is still broken because the CI still uses the broken NSS versions and the softhsm for other reasons that seem also macports related.

@simo5 simo5 merged commit de52d24 into latchset:main Nov 28, 2023
17 of 19 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants