Hi,

 

No, it is not impacted. We have tested it manually and verified by code inspection. The vulnerability in the reference implementation is caused by using an unsigned int when indexing the input. The Mbed TLS implementation does not do that.

 

Best regards,

Janos

(Mbed TLS developer)

 

From: Oubaid AKRMI via mbed-tls <mbed-tls@lists.trustedfirmware.org>
Date: Thursday, 12 October 2023 at 17:00
To: mbed-tls@lists.trustedfirmware.org <mbed-tls@lists.trustedfirmware.org>
Subject: [mbed-tls] Re: [Mbed-tls-announce] New Mbed TLS releases : 3.5.0 and 2.28.5

Hi,


Is the SHA-3 impacted by the vulnerability reported in NIST vulnerability database (link below) ?
https://nvd.nist.gov/vuln/detail/CVE-2022-37454

 

“Description

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface. 

 

 

Best regards,


Shape, rectangle

Description automatically generated

 

Oubaid AKRMI | Mobile: +33 7 53 06 08 49

GPM | Application Security Engineer

 

Icon

Description automatically generated         Icon

Description automatically generated     Icon

Description automatically generated     Icon

Description automatically generated    ST online: www.st.com