Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 11 Apr 2016 00:40:52 -0400 (EDT)
From: cve-assign@...re.org
To: matthias@...lons.info
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: libcrypto++ - Timing Attack Counter Measure

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://github.com/weidai11/cryptopp/issues/146

>> This counter measure seems to be removed by the compiler.

>> security bug

For "removed by the compiler" issues, sometimes the CVE is associated
with the upstream source code, and sometimes the CVE is associated
with a specific binary package that chose to compile in a way that was
unintended by the source-code authors. We feel that the former is the
best choice here.
https://github.com/weidai11/cryptopp/blob/master/Readme.txt says "The
following compilers are supported for this release ... GCC 3.3 - 5.2."
https://github.com/weidai11/cryptopp/blob/master/GNUmakefile mentions
the possibility of gcc -O3:

  # Aligned access required at -O3 for GCC
  ...
  ifeq ($(findstring -O3,$(CXXFLAGS)),-O3

issues/146 mentions "Debian compiles Crypto++ with the following
flags: -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 ...."

The gcc man page mentions:

  -O3 Optimize yet more.  -O3 turns on all optimizations specified by -O2

Thus, roughly speaking, it seems that all of Crypto++ had an
expectation of working with any recent version of gcc, even if (for
example) -O2 or -O3 is used. The "code to avoid timing attacks"
doesn't meet this expectation, and thus it's a vulnerability in
Crypto++. (It is not a vulnerability in the packaging within Debian or
any other distribution, and it is not a vulnerability in gcc.)

Use CVE-2016-3995 for this Crypto++ vulnerability.

(As a side note, Crypto++ is packaged for Fedora in the
cryptopp package, e.g., see the
http://pkgs.fedoraproject.org/cgit/rpms/cryptopp.git/tree/cryptopp.spec
page.)

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXCykdAAoJEL54rhJi8gl5gbMQAJzlqJxGZuh3bjUZSgxAdDOz
J7N+b2+vrYGHWqyEaxjjrfetLA5XNKcUKrLuT66Y1Zm0JrFg2pcEM35/dzjl81A0
KnLED6Q+q7LP+GXkuRh0LWYc8eUvmdlhjbY0Xb8NqkOSZD1uBkf6z2FNUr6yyoHF
m+HnSN4RYOXSwpROAY+JfKAmPzcJpDpziJA24y4tLMgKvK6Jbx08mGQjJCYMoZ3l
zX/KDQsmORPXwFbSNLIy20I5D6TTf8mNH18wkDFYKaiqSej7L+wXTOSEKkicnWtD
JQPkQzWq/6rb8uCtddg1GCSHk27OS54NxQMD18ETSXLPIjcsYzGzFAiKWXE44nGu
PckfsBzFTWuyjDKdjspE7RUIq+S3tpyUHjgbTgolK+q6RSvAvPFCXvCjn0SAhBzO
NPQecA9nXCV1oWd0d7a/OGrOaYGhnN8msDEamAVVIheyuQD6ySKCbrZjhPd9LQ/+
mPdZr5o7bW9121hB9nfcbHB6q/RTQusX91aa7R5sypPxIox7TG/TjAfSzp2fFIIk
dwhSZxbgDIyFceSw3Ne9yLRKJlegfwdHxlnhmO7/0X3GPSjG2b7clbhYieoirGrY
xhblDTjW49BikosQPEbc2LGP/9Awp5uokQBJ11BjAvEz9Qz+hqUQ1FWPcVwahlcg
URJpnBTtEN+FY6/u3+0W
=ztqN
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ