Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-3580

Опубликовано: 19 мар. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.7

Описание

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

jammy

needs-triage

noble

needs-triage

questing

needs-triage

upstream

needs-triage

Показывать по

EPSS

Процентиль: 2%
0.00013
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
27 дней назад

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

msrc
15 дней назад

Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V

CVSS3: 4.7
debian
27 дней назад

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_ ...

CVSS3: 4.7
github
27 дней назад

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

EPSS

Процентиль: 2%
0.00013
Низкий

4.7 Medium

CVSS3