-
Notifications
You must be signed in to change notification settings - Fork 804
Description
I've reviewed the code responsible for doing RSA PKCS#1v1.5 decryption:
https://github.com/sfackler/rust-openssl/blob/a644ec2542473c854a02b7fe642621e813517979/openssl/src/encrypt.rs#L440-L453
and I'm pretty sure that it is vulnerable to the Marvin Attack as it will perform a jump/branch based on the error value returned from OpenSSL.
If you'd like to perform actual test for the leakage (to confirm the review and measure the size of the side-channel), I can run the test, but I'd like to ask for help in writing a test harness. Example test harnesses are available in the marvin-toolkit repo, the one for rust-crypto would most likely be the easiest one to adapt for this package.
May I also ask for assigning a CVE to this issue? As a repo owner you can create a security issue here in github and ask for a CVE assignment.