LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.17-5ubuntu0.1", "binary_name": "libtomcrypt-dev" }, { "binary_version": "1.17-5ubuntu0.1", "binary_name": "libtomcrypt0" }, { "binary_version": "1.17-5ubuntu0.1", "binary_name": "libtomcrypt0-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.17-7ubuntu0.1", "binary_name": "libtomcrypt-dev" }, { "binary_version": "1.17-7ubuntu0.1", "binary_name": "libtomcrypt0" }, { "binary_version": "1.17-7ubuntu0.1", "binary_name": "libtomcrypt0-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.18.1-1ubuntu0.1", "binary_name": "libtomcrypt-dev" }, { "binary_version": "1.18.1-1ubuntu0.1", "binary_name": "libtomcrypt1" }, { "binary_version": "1.18.1-1ubuntu0.1", "binary_name": "libtomcrypt1-dbgsym" } ] }