You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replace the line 188 if (!TEST_true(sm2_plaintext_size(key, digest, ctext_len, &ptext_len)) with the following line: if (!TEST_true(sm2_plaintext_size(ctext, ctext_len, &ptext_len))
Contact Details
weitingcai2020@gmail.com
What happened?
我通过使用V1SCAN(一个扫描存在于复用代码中1-Day漏洞的工具),发现您的项目中Openharmonyv1.0/third_party/openssl/test文件夹下的
sm2_internal_test.c
文件可能存在漏洞, 具体参考链接如下:CVE-2021-3711 in
sm2_internal_test.c
:相关触发逻辑类似GHSA-5ww6-px42-wc85
NVD说明链接:
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
Replace the line 188
if (!TEST_true(sm2_plaintext_size(key, digest, ctext_len, &ptext_len))
with the following line:if (!TEST_true(sm2_plaintext_size(ctext, ctext_len, &ptext_len))
考虑到其可能存在的潜在风险,我愿意配合您以负责任的方式及时核实、解决和报告发现的漏洞。 如果您需要任何进一步的信息或帮助,请随时与我联系。如果需要,我也可以提交PR帮助您修复。 谢谢您,期待尽快收到您的回复!
The text was updated successfully, but these errors were encountered: