]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Add CHANGES.md and NEWS.md updates for CVE-2024-13176
authorTomas Mraz <tomas@openssl.org>
Wed, 15 Jan 2025 17:29:52 +0000 (18:29 +0100)
committerTomas Mraz <tomas@openssl.org>
Mon, 20 Jan 2025 08:40:48 +0000 (09:40 +0100)
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/26429)

(cherry picked from commit c3144e102571517df6c15ccc049fa3660ab3cb0a)

CHANGES.md
NEWS.md

index b3d45c65fbbae068f172c055bdd10b7c132c1772..41db454b2c5b8e0c176835c023a7175cdc287874 100644 (file)
@@ -27,6 +27,19 @@ OpenSSL 3.2
 
 ### Changes between 3.2.3 and 3.2.4 [xx XXX xxxx]
 
+ * Fixed timing side-channel in ECDSA signature computation.
+
+   There is a timing signal of around 300 nanoseconds when the top word of
+   the inverted ECDSA nonce value is zero. This can happen with significant
+   probability only for some of the supported elliptic curves. In particular
+   the NIST P-521 curve is affected. To be able to measure this leak, the
+   attacker process must either be located in the same physical computer or
+   must have a very fast network connection with low latency.
+
+   ([CVE-2024-13176])
+
+   *Tomáš Mráz*
+
  * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
    curve parameters.
 
@@ -20513,6 +20526,7 @@ ndif
 
 <!-- Links -->
 
+[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
 [CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
 [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
diff --git a/NEWS.md b/NEWS.md
index 6f425172647b5826c6bd3e441b954cd17aa4ae0e..9561d02886076f4b56ac67461c96009ee594e413 100644 (file)
--- a/NEWS.md
+++ b/NEWS.md
@@ -27,6 +27,9 @@ release is Low.
 
 This release incorporates the following bug fixes and mitigations:
 
+  * Fixed timing side-channel in ECDSA signature computation.
+    ([CVE-2024-13176])
+
   * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
     curve parameters.
     ([CVE-2024-9143])
@@ -1624,6 +1627,7 @@ OpenSSL 0.9.x
 
 <!-- Links -->
 
+[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
 [CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
 [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535