-
-
Notifications
You must be signed in to change notification settings - Fork 5.8k
routers: do not leak secrets via timing side channel #7364
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
routers: do not leak secrets via timing side channel #7364
Conversation
@@ -771,7 +772,9 @@ func TriggerTask(ctx *context.Context) { | |||
if ctx.Written() { | |||
return | |||
} | |||
if secret != base.EncodeMD5(owner.Salt) { | |||
8000 | got := []byte(base.EncodeMD5(owner.Salt)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why does this
- use md5?
- use owner's salt instead of some secret?
And who calls this API? Couldn't find any callers inside gitea itself.
Codecov Report
@@ Coverage Diff @@
## master #7364 +/- ##
==========================================
+ Coverage 41.24% 41.25% +<.01%
==========================================
Files 467 467
Lines 63291 63295 +4
==========================================
+ Hits 26107 26111 +4
+ Misses 33769 33768 -1
- Partials 3415 3416 +1
Continue to review full report at Codecov.
|
* routers: do not leak secrets via timing side channel * routers/repo: do not leak secrets via timing side channel
No description provided.