]> git.ipfire.org Git - thirdparty/openssl.git/commit - CHANGES.md
Ensure SRP BN_mod_exp follows the constant time path
authorMatt Caswell <matt@openssl.org>
Wed, 6 Jan 2021 17:03:44 +0000 (17:03 +0000)
committerMatt Caswell <matt@openssl.org>
Wed, 20 Jan 2021 16:26:22 +0000 (16:26 +0000)
commit5b57aa24c35f78cc11aa91586bc8e8826c2ece5a
treeb876321662b6e4828fbe4c011beba2986424f777
parent53d650d1f3b34188a86409def4d086974b301cef
Ensure SRP BN_mod_exp follows the constant time path

SRP_Calc_client_key calls BN_mod_exp with private data. However it was
not setting BN_FLG_CONSTTIME and therefore not using the constant time
implementation. This could be exploited in a side channel attack to
recover the password.

Since the attack is local host only this is outside of the current OpenSSL
threat model and therefore no CVE is assigned.

Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this
issue.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/13888)
CHANGES.md
crypto/srp/srp_lib.c