[OSSA 2014-002] Possible timing attack against tempurl (CVE-2014-0006)
Bug #1265665 reported by
Samuel Merritt
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Object Storage (swift) |
Fix Released
|
Undecided
|
Unassigned | ||
Grizzly |
Fix Committed
|
Undecided
|
Unassigned | ||
Havana |
Fix Committed
|
Undecided
|
Unassigned | ||
OpenStack Security Advisory |
Fix Released
|
Medium
|
Thierry Carrez |
Bug Description
Swift's TempURL middleware compares a user-submitted string (HMAC digest) against a list of valid strings to determine whether or not to allow access to an object. The string comparison uses Python's builtin string comparison, which short-circuits evaluation on the first differing character, which may let an attacker perform timing analysis.
The attached patch changes the string comparison to be constant-time.
CVE References
Changed in ossa: | |
importance: | Undecided → Medium |
Changed in swift: | |
status: | New → In Progress |
Changed in swift: | |
milestone: | none → 1.12.0 |
information type: | Private Security → Public Security |
Changed in swift: | |
status: | Fix Committed → Fix Released |
Changed in ossa: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
+2 looks good to me