OpenSSL Advisory: October 29th, 2018 (BoringSSL Not Affected)

OpenSSL have published two security advisories (1, 2). Here's how they affect BoringSSL:

CVESummarySeverity in OpenSSLImpact to BoringSSL
CVE-2018-0734Timing vulnerability in DSA signature generationLowNot affected, impacted code was removed from BoringSSL in the initial fork
CVE-2018-0735Timing vulnerability in ECDSA signature generationLowNot affected, issue was introduced after fork

CVE-2018-0734 and CVE-2018-0735

These are low-severity timing leaks in OpenSSL’s EC scalar multiplication and DSA signing implementations. As a partial mitigation for a deeper issue in OpenSSL’s BIGNUM library, OpenSSL adds extra copies of the group order to the scalar before multiplying (EC) and exponentiating (DSA). This advisory addresses leaks in that logic. BoringSSL removed the impacted code last year and fixed the underlying BIGNUM issue, so it is unaffected.