mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2024-12-29 09:21:19 +00:00
0b39d1ed7d
Upon further consideration we think that a remote attacker close to the victim might be able to have precise enough timing information to exploit the side channel as well. Update the Changelog to reflect this. Signed-off-by: Janos Follath <janos.follath@arm.com>
9 lines
506 B
Plaintext
9 lines
506 B
Plaintext
Security
|
|
* Fix a timing side channel in private key RSA operations. This side channel
|
|
could be sufficient for an attacker to recover the plaintext. A local
|
|
attacker or a remote attacker who is close to the victim on the network
|
|
might have precise enough timing measurements to exploit this. It requires
|
|
the attacker to send a large number of messages for decryption. For
|
|
details, see "Everlasting ROBOT: the Marvin Attack", Hubert Kario. Reported
|
|
by Hubert Kario, Red Hat.
|