Skip to content

s2n-tls could negotiate signature algorithms not allowed by policy

Low
dougch published GHSA-97r4-p6c4-5gv3 Oct 5, 2023

Package

s2n-tls

Affected versions

<1.3.54

Patched versions

1.3.54

Description

Impact

s2n-tls clients and servers negotiating TLS1.2 could choose a SHA-1 hash in TLS connection signatures despite their s2n-tls security policy not supporting SHA-1.

Customers of AWS services do not need to take action. Applications using s2n-tls should upgrade to the most recent release of s2n-tls.

Patches

The patch is included in s2n-tls v1.3.54

Workarounds

There is no workaround. Applications using s2n-tls should upgrade to the most recent release of s2n-tls.

If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our vulnerability reporting page or directly via email to [email protected]. Please do not create a public GitHub issue.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs