Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Correctly handle invalid hashed passwords in bcrypt.checkpw. #95

Merged
merged 1 commit into from
Oct 3, 2016

Conversation

alex
Copy link
Member

@alex alex commented Oct 2, 2016

Previously it would silently accept extra data, and overread a buffer on truncated data.

Reported by Matthew Russell

Previously it would silently accept extra data, and overread a buffer on truncated data.

Reported by Matthew Russell
@reaperhulk
Copy link
Member

LGTM. I don't think we're concerned with a timing attack here, but I will say that out loud just to confirm we're all agreed.

@alex
Copy link
Member Author

alex commented Oct 2, 2016

I don't think variable in the length is an attack vector.

On Oct 2, 2016 4:48 PM, "Paul Kehrer" notifications@github.com wrote:

LGTM. I don't think we're concerned with a timing attack here, but I will
say that out loud just to confirm we're all agreed.


You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
#95 (comment), or mute
the thread
https://github.com/notifications/unsubscribe-auth/AAADBMTEgihNkrCRL9aQhvuUqWUNTmLnks5qwBiAgaJpZM4KMCin
.

@reaperhulk reaperhulk merged commit fcebaa0 into pyca:master Oct 3, 2016
@alex alex deleted the checkpwd-fixes branch October 3, 2016 01:20
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Aug 16, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants