Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.10.12"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.0"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.3"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.4"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.5"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.6"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.7"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.8"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.9"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.10"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.11"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.12"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.13"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.14"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.15"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.16"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.17"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.18"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.19"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.20"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.21"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.22"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.23"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.24"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.25"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.26"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.27"
},
{
"introduced": "0"
},
{
"last_affected": "1.11.28"
}
]
}