Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
gnutls.33311
gnutls-CVE-2023-0361.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File gnutls-CVE-2023-0361.patch of Package gnutls.33311
From 80a6ce8ddb02477cd724cd5b2944791aaddb702a Mon Sep 17 00:00:00 2001 From: Alexander Sosedkin <asosedkin@redhat.com> Date: Tue, 9 Aug 2022 16:05:53 +0200 Subject: [PATCH 1/3] auth/rsa: side-step potential side-channel Remove branching that depends on secret data. Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com> Signed-off-by: Hubert Kario <hkario@redhat.com> Tested-by: Hubert Kario <hkario@redhat.com> --- lib/auth/rsa.c | 10 ---------- 1 file changed, 10 deletions(-) Index: gnutls-3.7.3/lib/auth/rsa.c =================================================================== --- gnutls-3.7.3.orig/lib/auth/rsa.c +++ gnutls-3.7.3/lib/auth/rsa.c @@ -155,13 +155,10 @@ static int proc_rsa_client_kx(gnutls_session_t session, uint8_t * data, size_t _data_size) { - const char attack_error[] = "auth_rsa: Possible PKCS #1 attack\n"; gnutls_datum_t ciphertext; int ret, dsize; ssize_t data_size = _data_size; volatile uint8_t ver_maj, ver_min; - volatile uint8_t check_ver_min; - volatile uint32_t ok; #ifdef ENABLE_SSL3 if (get_num_version(session) == GNUTLS_SSL3) { @@ -187,7 +184,6 @@ proc_rsa_client_kx(gnutls_session_t sess ver_maj = _gnutls_get_adv_version_major(session); ver_min = _gnutls_get_adv_version_minor(session); - check_ver_min = (session->internals.allow_wrong_pms == 0); session->key.key.data = gnutls_malloc(GNUTLS_MASTER_SIZE); if (session->key.key.data == NULL) { @@ -206,10 +202,9 @@ proc_rsa_client_kx(gnutls_session_t sess return ret; } - ret = - gnutls_privkey_decrypt_data2(session->internals.selected_key, - 0, &ciphertext, session->key.key.data, - session->key.key.size); + gnutls_privkey_decrypt_data2(session->internals.selected_key, + 0, &ciphertext, session->key.key.data, + session->key.key.size); /* After this point, any conditional on failure that cause differences * in execution may create a timing or cache access pattern side * channel that can be used as an oracle, so treat very carefully */ @@ -225,25 +220,6 @@ proc_rsa_client_kx(gnutls_session_t sess * Vlastimil Klima, Ondej Pokorny and Tomas Rosa. */ - /* ok is 0 in case of error and 1 in case of success. */ - - /* if ret < 0 */ - ok = CONSTCHECK_EQUAL(ret, 0); - /* session->key.key.data[0] must equal ver_maj */ - ok &= CONSTCHECK_EQUAL(session->key.key.data[0], ver_maj); - /* if check_ver_min then session->key.key.data[1] must equal ver_min */ - ok &= CONSTCHECK_NOT_EQUAL(check_ver_min, 0) & - CONSTCHECK_EQUAL(session->key.key.data[1], ver_min); - - if (ok) { - /* call logging function unconditionally so all branches are - * indistinguishable for timing and cache access when debug - * logging is disabled */ - _gnutls_no_log("%s", attack_error); - } else { - _gnutls_debug_log("%s", attack_error); - } - /* This is here to avoid the version check attack * discussed above. */
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor