io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
{ "nvd_published_at": "2023-04-21T18:15:07Z", "github_reviewed": true, "github_reviewed_at": "2025-02-05T19:42:53Z", "severity": "CRITICAL", "cwe_ids": [ "CWE-203" ] }