From:
Oubaid AKRMI via mbed-tls <mbed-tls@lists.trustedfirmware.org>
Date: Thursday, 12 October 2023 at 17:00
To: mbed-tls@lists.trustedfirmware.org <mbed-tls@lists.trustedfirmware.org>
Subject: [mbed-tls] Re: [Mbed-tls-announce] New Mbed TLS releases : 3.5.0 and 2.28.5
Hi,
Is the SHA-3 impacted by the vulnerability reported in NIST vulnerability database (link below) ?
https://nvd.nist.gov/vuln/detail/CVE-2022-37454
“Description
The Keccak XKCP SHA-3 reference implementation before fdc6fef has an
integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties.
This occurs in the sponge function interface. “
Best regards,
Oubaid AKRMI | Mobile: +33 7 53 06 08 49
GPM
|
Application Security Engineer
ST online:
www.st.com