-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix TLS pad buffer zeroization #8068
Fix TLS pad buffer zeroization #8068
Conversation
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@@ -0,0 +1,3 @@ | |||
Bugfix | |||
* Fix a case where potentially sensitive information would not be completely | |||
zeroized during TLS handshake. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we be more specific about the affected scenarios? E.g., is it 1.2 only, is it only for certain key exchanges, etc etc?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have tried to be specific as I can be - yes this is TLS1.2 only, but its not dependant on hash used, all paths lead to this.
26c8730
to
d00a3fa
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mostly LGTM
@@ -0,0 +1,3 @@ | |||
Bugfix |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should be Security not Bugfix
Bugfix | |
Security |
@@ -0,0 +1,3 @@ | |||
Bugfix | |||
* Fix a case where potentially sensitive information would not be completely | |||
zeroized during TLS 1.2 handshake, in both server and client configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(1) this should be Security
(2) this should mention "in memory" as it's user-facing: it could be possible to interpret this as some old data leaking into a message on the wire "during TLS 1.2 handshake"
@paul-elliott-arm this still needs a Changelog update? |
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
d00a3fa
to
83ae22d
Compare
Sorry, moving too fast and forgot to amend the actual changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Description
Fix an issue whereby the pad buffer was not completely zeroized in some cases during TLS handshake.
PR checklist
Please tick as appropriate and edit the reasons (e.g.: "backport: not needed because this is a new feature")
, or not requireddone, ornot required - code does not exist in 2.28provided, ornot required - not something that is easily testable, XXX err, actually see Check mbedtls_platform_zeroize() calls #8143