DEBIAN-CVE-2025-9231

Source
https://security-tracker.debian.org/tracker/CVE-2025-9231
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-9231.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-9231
Upstream
Published
2025-09-30T14:15:41Z
Modified
2025-10-04T04:04:34.112982Z
Summary
[none]
Details

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.. While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack. OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

References

Affected packages

Debian:13 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.1-1+deb13u1

Affected versions

3.*

3.5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.4-1

Affected versions

3.*

3.5.1-1
3.5.2-1
3.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}