]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Add CHANGES.md and NEWS.md updates for CVE-2024-13176
authorTomas Mraz <tomas@openssl.org>
Wed, 15 Jan 2025 17:29:52 +0000 (18:29 +0100)
committerTomas Mraz <tomas@openssl.org>
Mon, 20 Jan 2025 08:42:04 +0000 (09:42 +0100)
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/26429)

(cherry picked from commit c3144e102571517df6c15ccc049fa3660ab3cb0a)

CHANGES.md
NEWS.md

index 78cc38fbc1cc1addd84d7d831fd5e27de3796096..002c1192d1fc4888b6ef30fddc78e614344075a3 100644 (file)
@@ -30,6 +30,19 @@ breaking changes, and mappings for the large list of deprecated functions.
 
 ### Changes between 3.0.15 and 3.0.16 [xx XXX xxxx]
 
+ * Fixed timing side-channel in ECDSA signature computation.
+
+   There is a timing signal of around 300 nanoseconds when the top word of
+   the inverted ECDSA nonce value is zero. This can happen with significant
+   probability only for some of the supported elliptic curves. In particular
+   the NIST P-521 curve is affected. To be able to measure this leak, the
+   attacker process must either be located in the same physical computer or
+   must have a very fast network connection with low latency.
+
+   ([CVE-2024-13176])
+
+   *Tomáš Mráz*
+
  * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
    curve parameters.
 
@@ -19940,6 +19953,7 @@ ndif
 
 <!-- Links -->
 
+[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
 [CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
 [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
diff --git a/NEWS.md b/NEWS.md
index 612c04a6e12ed6e06652595e253d537e0b9bda41..dbd91a26a6519eda4ceb63078d5f79f9ce6a7940 100644 (file)
--- a/NEWS.md
+++ b/NEWS.md
@@ -25,6 +25,9 @@ release is Low.
 
 This release incorporates the following bug fixes and mitigations:
 
+  * Fixed timing side-channel in ECDSA signature computation.
+    ([CVE-2024-13176])
+
   * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
     curve parameters.
     ([CVE-2024-9143])
@@ -1506,6 +1509,7 @@ OpenSSL 0.9.x
 
 <!-- Links -->
 
+[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
 [CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
 [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535