Source: libcrypto++ Version: 5.6.4-8 Severity: important Tags: security upstream Forwarded: https://github.com/weidai11/cryptopp/issues/869 Control: found -1 5.6.4-7 Control: found -1 8.2.0-1
Hi, The following vulnerability was published for libcrypto++. CVE-2019-14318[0]: | Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA | signature generation. This allows a local or remote attacker, able to | measure the duration of hundreds to thousands of signing operations, | to compute the private key used. The issue occurs because scalar | multiplication in ecp.cpp (prime field curves, small leakage) and | algebra.cpp (binary field curves, large leakage) is not constant time | and leaks the bit length of the scalar among other information. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-14318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14318 [1] https://github.com/weidai11/cryptopp/issues/869 Regards, Salvatore