-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CHACHA20 POLY1305 succeeds with IV size of 16 (OpenSSL CVE-2019-1543) #4301
Comments
Thanks for the report @guidovranken, we will try to schedule this work in soon. Note: Having checked this in the code I can verify that the nonce is documented to only be 96 bits however it is never checked by the library. |
This affects This is only a problem in the classic |
This issue affects modes with a fixed IV size (all except GCM and CCM), and only if the fixed size is neither 0 nor |
The cipher behavior fix is trivial, but the way we handle iv in our tests is a problem. |
@AndrzejKurek For the functions that have a hard-coded IV, I think making the IV length a function of the cipher ID is a reasonable solution. For negative tests, I guess we have to add a new function anyway? |
OpenSSL addressed this: https://www.openssl.org/news/secadv/20190306.txt
I've been working around this in my fuzzer (https://github.com/guidovranken/cryptofuzz/blob/5a41fd9293b818a8094ca9c9a0b491f9eb5e2b76/modules/mbedtls/module.cpp#L390-L395) but maybe this is something you'd like to address?
The text was updated successfully, but these errors were encountered: