Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check for diversifier overflow #1371

Merged
merged 1 commit into from
Dec 20, 2023

Conversation

AaronFeickert
Copy link
Contributor

PR intention

Checks for overflow during diversifier decryption.

Closes #1370.

Code changes brief

When a diversifier is decrypted, it is truncated if its length exceeds uint64_t bounds. This would only occur due to a malicious sender and should be rejected.

This PR checks the decrypted diversifier length. If it does not precisely match that of an encoded uint64_t, it throws an error.

@reubenyap reubenyap merged commit b6371c7 into firoorg:master Dec 20, 2023
5 checks passed
@AaronFeickert AaronFeickert deleted the diversifier-overflow branch December 20, 2023 16:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Spark diversifiers can be truncated if invalid
3 participants