mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
5b57aa24c3
SRP_Calc_client_key calls BN_mod_exp with private data. However it was not setting BN_FLG_CONSTTIME and therefore not using the constant time implementation. This could be exploited in a side channel attack to recover the password. Since the attack is local host only this is outside of the current OpenSSL threat model and therefore no CVE is assigned. Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this issue. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13888) |
||
---|---|---|
.. | ||
build.info | ||
srp_lib.c | ||
srp_vfy.c |