Описание
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 4.3.0+dfsg-2 |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | not-affected | 4.3.0+dfsg-2 |
| esm-apps/jammy | not-affected | 4.3.0+dfsg-2 |
| esm-apps/noble | not-affected | 4.3.0+dfsg-2 |
| esm-apps/xenial | needs-triage | |
| esm-infra-legacy/trusty | DNE |
Показывать по
Ссылки на источники
EPSS
4.3 Medium
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
An issue was discovered in wolfSSL before 4.3.0 in a non-default confi ...
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
EPSS
4.3 Medium
CVSS2
5.3 Medium
CVSS3