wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "4.1.0+dfsg-2" }, { "binary_name": "libwolfssl19", "binary_version": "4.1.0+dfsg-2" }, { "binary_name": "libwolfssl19-dbgsym", "binary_version": "4.1.0+dfsg-2" } ] }