Source: wolfssl
Version: 5.2.0-2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for wolfssl.

CVE-2022-42961[0]:
| An issue was discovered in wolfSSL before 5.5.0. A fault injection
| attack on RAM via Rowhammer leads to ECDSA key disclosure. Users
| performing signing operations with private ECC keys, such as in
| server-side TLS connections, might leak faulty ECC signatures. These
| signatures can be processed via an advanced technique for ECDSA key
| recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to
| address the vulnerability.)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-42961
    https://www.cve.org/CVERecord?id=CVE-2022-42961

Regards,
Salvatore

Reply via email to