Your submission was sent successfully! Close

CVE-2019-13628

Published: 03 October 2019

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

Priority

Low

CVSS 3 base score: 4.7

Status

Package Release Status
wolfssl
Launchpad, Ubuntu, Debian
Upstream
Released (4.1.0+dfsg-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(4.1.0+dfsg-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(4.1.0+dfsg-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(4.1.0+dfsg-2)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist