Skip to content

Commit 4b6ef83

Browse files
committed
Clarify attribution for the Bleichenbacher's Cat fix
1 parent 6c2f139 commit 4b6ef83

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

ChangeLog

+5-2
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,11 @@ Security
77
decryption that could lead to a Bleichenbacher-style padding oracle
88
attack. In TLS, this affects servers that accept ciphersuites based on
99
RSA decryption (i.e. ciphersuites whose name contains RSA but not
10-
(EC)DH(E)). Reported by Eyal Ronen, Robert Gillham, Daniel Genkin, Adi
11-
Shamir, David Wong and Yuval Yarom. CVE-2018-19608
10+
(EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
11+
(University of Adelaide), Daniel Genkin (University of Michigan),
12+
Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
13+
(University of Adelaide, Data61). The attack is described in more detail
14+
in the paper available here: http://cat.eyalro.net/cat.pdf CVE-2018-19608
1215
* In mbedtls_mpi_write_binary(), don't leak the exact size of the number
1316
via branching and memory access patterns. An attacker who could submit
1417
a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing

0 commit comments

Comments
 (0)