
oss-sec mailing list archives
Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths
From: Huzaifa Sidhpurwala <huzaifas () redhat com>
Date: Wed, 25 Apr 2018 11:11:14 +0530
On 04/24/2018 09:18 PM, Billy Brumley wrote:
Look for our preprint on http://eprint.iacr.org/ soon -- working title is "One Shot, One Trace, One Key: Cache-Timing Attacks on RSA Key Generation". We'll update the list with the full URL once it's posted.Can you post a link to the draft here please?The preprint is now up: https://eprint.iacr.org/2018/367The attack vector is not clear, does the attacker need to be on the same physical machine or is this a cross-vm attack?https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-0737 Your statement is pretty accurate. (Although I fail to see the difference between physical machine and cross-vm.)
Physical machine implies, the attacker and victim is on the same host (real computer or a vm). Cross-vm implies attacker and the victim can be on two different virtual machines, running on the same hypervisor.
BBB
-- Huzaifa Sidhpurwala / Red Hat Product Security Team
Current thread:
- CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Billy Brumley (Apr 16)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Huzaifa Sidhpurwala (Apr 16)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Billy Brumley (Apr 24)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Huzaifa Sidhpurwala (Apr 24)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Billy Brumley (Apr 24)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Billy Brumley (Apr 19)
- Re: CVE-2018-0737 OpenSSL: RSA key generation follows several non constant time code paths Huzaifa Sidhpurwala (Apr 16)