Bug 28145 - crypto++ security issue CVE-2019-14318
Summary: crypto++ security issue CVE-2019-14318
Status: RESOLVED DUPLICATE of bug 25759
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: Cauldron
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-01-17 13:28 CET by Zombie Ryushu
Modified: 2021-01-17 17:47 CET (History)
0 users

See Also:
Source RPM: libcryptopp-8.2.0-2.mga8.src.rpm
CVE: CVE-2019-14318
Status comment:


Attachments

Description Zombie Ryushu 2021-01-17 13:28:08 CET
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.
Zombie Ryushu 2021-01-17 13:28:22 CET

CVE: (none) => CVE-2019-14318

Comment 1 David Walser 2021-01-17 17:47:12 CET
Already reported and FIXED!!!

*** This bug has been marked as a duplicate of bug 25759 ***

Status: NEW => RESOLVED
Resolution: (none) => DUPLICATE


Note You need to log in before you can comment on or make changes to this bug.