-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v0.101.5 broke semver for CertificateRevocationList.verify_signature #185
Comments
Sorry for missing this in review. 😞 Seems surprising that our semver check in CI didn't catch this? |
It happens :-( I missed it reviewing the orignal work, and in the backport too.
Agreed. I thought initially the rel-0.101 branch might not have that in its CI, but it does: webpki/.github/workflows/ci.yml Lines 230 to 240 in 7cb6c64
|
v0.101.6 resolves this issue. |
Just to make sure I understand this change correctly, does v0.101.6 still contain a fix for GHSA-fh2r-99q2-6mmg/RUSTSEC-2023-0053, or does reverting the semver-breaking change once again make v0.101.6 vulnerable to the CPU exhaustion DoS? Thanks in advance. |
That's correct: we're still limiting the number of signature validation operations that can occur during path building (including CRL signature validation operations) in v0.101.6. The only change is that the mechanism for doing that hasn't bled into the API. |
Okay, cool, thanks for confirming! |
ac2faa7 was backported to the v0.101.x release in v0.101.5. This work originated in #164, but shouldn't have been backported to the 0.101.x release stream, because it changes the
CertificateRevocationList
trait in a semver breaking way, adding a new argument to theverify_signature
fn. This trait and its fns are part of the public API, e.g. inrcgen
's webpki tests (reported by est31).Let's fix this in a point release and leave this note in place until then so the issue is discoverable.
The text was updated successfully, but these errors were encountered: