GNU bug report logs

#31831 CVE-2018-0495 Key Extraction Side Channel in Multiple Crypto Libraries

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #5 received at submit@debbugs.gnu.org (full text, mbox, reply):

Received: (at submit) by debbugs.gnu.org; 14 Jun 2018 19:23:53 +0000
From debbugs-submit-bounces@debbugs.gnu.org Thu Jun 14 15:23:53 2018
Received: from localhost ([127.0.0.1]:48445 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1fTXqb-0001Uv-3Y
	for submit@debbugs.gnu.org; Thu, 14 Jun 2018 15:23:53 -0400
Received: from eggs.gnu.org ([208.118.235.92]:39998)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <leo@famulari.name>) id 1fTXqZ-0001Ui-3y
 for submit@debbugs.gnu.org; Thu, 14 Jun 2018 15:23:51 -0400
Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71)
 (envelope-from <leo@famulari.name>) id 1fTXqA-0007ia-Ou
 for submit@debbugs.gnu.org; Thu, 14 Jun 2018 15:23:45 -0400
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org
X-Spam-Level: 
X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_50,T_DKIM_INVALID
 autolearn=disabled version=3.3.2
Received: from lists.gnu.org ([2001:4830:134:3::11]:46327)
 by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32)
 (Exim 4.71) (envelope-from <leo@famulari.name>) id 1fTXqA-0007iH-GB
 for submit@debbugs.gnu.org; Thu, 14 Jun 2018 15:23:26 -0400
Received: from eggs.gnu.org ([2001:4830:134:3::10]:58221)
 by lists.gnu.org with esmtp (Exim 4.71)
 (envelope-from <leo@famulari.name>) id 1fTXpO-0007gE-OD
 for bug-guix@gnu.org; Thu, 14 Jun 2018 15:23:26 -0400
Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71)
 (envelope-from <leo@famulari.name>) id 1fTXp0-0006kK-Hr
 for bug-guix@gnu.org; Thu, 14 Jun 2018 15:22:37 -0400
Received: from out2-smtp.messagingengine.com ([66.111.4.26]:43731)
 by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32)
 (Exim 4.71) (envelope-from <leo@famulari.name>) id 1fTXp0-0006iT-1m
 for bug-guix@gnu.org; Thu, 14 Jun 2018 15:22:14 -0400
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
 by mailout.nyi.internal (Postfix) with ESMTP id 10C7221398;
 Thu, 14 Jun 2018 15:22:13 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute4.internal (MEProxy); Thu, 14 Jun 2018 15:22:13 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name;
 h=content-type:date:from:message-id:mime-version:subject:to
 :x-me-sender:x-me-sender:x-sasl-enc; s=mesmtp; bh=k0f0koaGOP0rRa
 X6wbOb/86j9HRpAtLxJRaSQRI12sI=; b=IPrqwGgEqL13uxZHS5g5ADGqHoO+NF
 /iiIP3J/raeNAaDNBcsmNQcct5pBtlq3wFqEB180xjdulrAEgaLI6uV9kMbcAoDa
 bSR4fZs0uRLDQP3iyvl7VMCtN6LawE3qI3MEFdo6Y5KIbwgRoVExTK3dUWDtG4T4
 ITktBtEJ34B0Q=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
 messagingengine.com; h=content-type:date:from:message-id
 :mime-version:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=
 fm3; bh=k0f0koaGOP0rRaX6wbOb/86j9HRpAtLxJRaSQRI12sI=; b=kNxYFj/S
 6qpFqvveXKXkwyMVD6sxtzMXfA47rZH6uVjY0BfDz8DlrZ6Q+osem4KA5yQ8YmsT
 40HXui0d4jKDAkgFw15zxNuu3aoeLYHETf/OWf1bMUnJ9qCsrhujeVcwtONEffLf
 YYfQ1QZryuVYfIj4yQkKZsD7EuoVZK73QxysDGx2LXFGa4nnYzN7YTxud2POKNjh
 ELqv+XDPocQ3eZaGdOrL9iX/m2JCCCeerEnJmNQqfvBahR576N0QAfIJjDyPuHjH
 0hNrctCtClXFvI5p8IgPRv3RaxD2RfhGCgQCc2U2df1nOAkruxi53r5a0XsKm10W
 BMfr6e8nXzu+ZQ==
X-ME-Proxy: <xmx:ZMAiWyp-udUUvk7EacXaOvs-yY9nxGdCKShrUd3q2znxuEE7Hhm-rg>
 <xmx:ZMAiWz0ohdtKDAN5S3FCgEf-T8AdEq1NCoFx6uKbg-IQrrS5zpgQ3Q>
 <xmx:ZMAiWzeOHNw60M3WP73RA6fZvBeY3cvZPqjb5oXMVW9LLqmdJWv42Q>
 <xmx:ZMAiWw5OV4iw5SI9eXSFBwJhHKMD-tES4PUfwDGXPpZGxnyoKL-3Aw>
 <xmx:ZMAiW_-2Boqa8krf_4_LEV4wWu_rM88XRT8ZyfBNAONC5Av6r3kU_w>
 <xmx:ZcAiWyl3vBOFFDUDv-szwcG3YxgD2LI66JitPFwLRwnL4uqmpsQEaw>
X-ME-Sender: <xms:ZMAiWwHJtBxTbAO9pZlKTwzoGulohzAb-O-z_01GVGPfioJUqEHhwQ>
Received: from localhost (c-76-124-202-137.hsd1.pa.comcast.net
 [76.124.202.137])
 by mail.messagingengine.com (Postfix) with ESMTPA id 9CA0E1025C
 for <bug-guix@gnu.org>; Thu, 14 Jun 2018 15:22:12 -0400 (EDT)
Date: Thu, 14 Jun 2018 15:22:11 -0400
From: Leo Famulari <leo@famulari.name>
To: bug-guix@gnu.org
Subject: CVE-2018-0495 Key Extraction Side Channel in Multiple Crypto Libraries
Message-ID: <20180614192211.GA21522@jasmine.lan>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature"; boundary="gBBFr7Ir9EOA20Yy"
Content-Disposition: inline
User-Agent: Mutt/1.10.0 (2018-05-17)
X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic]
 [fuzzy]
X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x
X-Received-From: 2001:4830:134:3::11
X-Spam-Score: -4.1 (----)
X-Debbugs-Envelope-To: submit
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -5.1 (-----)
[Message part 1 (text/plain, inline)]
Recently a new side-channel key extraction technique was published as
CVE-2018-0495, and it affects a lot of the cryptographic libraries we
package:

https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/?style=Cyber+Security

An excerpt from that advisory:

------
We analyzed the source code of several open source cryptographic
libraries to see if they contain the vulnerable code pattern in the code
for ECDSA, DSA, or both. This list is accurate to the best of our
knowledge, but it is not exhaustive. Only the first group was affected
by this finding; the other three groups are not thought to be
vulnerable.

Contains vulnerable pattern: CryptLib (Both), LibreSSL (Both), Mozilla
NSS (Both), Botan (ECDSA), OpenSSL (ECDSA), WolfCrypt (ECDSA), Libgcrypt
(ECDSA), LibTomCrypt (ECDSA), LibSunEC (ECDSA), MatrixSSL (ECDSA),
BoringSSL (DSA)

Non-constant math, but different pattern: BouncyCastle, Crypto++, Golang
crypto/tls, C#/Mono, mbedTLS, Trezor Crypto, Nettle (DSA)

Constant time-math: Nettle (ECDSA), BearSSL, Libsecp256k1

Does not implement either: NaCl
------

Note that libtomcrypt is bundled in the Dropbear SSH implementation.

I'm going to test the libgcrypt update now.

I'd like for other Guix hackers to "claim" an affected package in this
thread, and then investigate and test the fixes. Please make new debbugs
tickets on guix-patches for each bug-fix patch you propose, and send the
links to those tickets here.
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sat Dec 21 18:37:04 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.