[OSSA 2014-002] Possible timing attack against tempurl (CVE-2014-0006)
Bug #1265665 reported by
Samuel Merritt
This bug affects 1 person
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| OpenStack Object Storage (swift) |
Fix Released
|
Undecided
|
Unassigned | ||
| Grizzly |
Fix Committed
|
Undecided
|
Unassigned | ||
| Havana |
Fix Committed
|
Undecided
|
Unassigned | ||
| OpenStack Security Advisory |
Fix Released
|
Medium
|
Thierry Carrez | ||
Bug Description
Swift's TempURL middleware compares a user-submitted string (HMAC digest) against a list of valid strings to determine whether or not to allow access to an object. The string comparison uses Python's builtin string comparison, which short-circuits evaluation on the first differing character, which may let an attacker perform timing analysis.
The attached patch changes the string comparison to be constant-time.
CVE References
| Changed in ossa: | |
| importance: | Undecided → Medium |
| Changed in swift: | |
| status: | New → In Progress |
| Changed in swift: | |
| milestone: | none → 1.12.0 |
| information type: | Private Security → Public Security |
| Changed in swift: | |
| status: | Fix Committed → Fix Released |
| Changed in ossa: | |
| status: | Fix Committed → Fix Released |
To post a comment you must log in.

+2 looks good to me