JLSEC-2025-198

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-198.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-198.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-198
Upstream
Published
2025-11-21T15:59:04.054Z
Modified
2025-11-21T16:20:55.075989Z
Summary
Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, us...
Details

Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)

Database specific
{
    "sources": [
        {
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-16910",
            "published": "2019-09-26T13:15:10.790Z",
            "id": "CVE-2019-16910",
            "imported": "2025-11-20T23:04:00.259Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16910",
            "modified": "2024-11-21T04:31:19.680Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / MbedTLS_jll

Package

Name
MbedTLS_jll
Purl
pkg:julia/MbedTLS_jll?uuid=c8ffd9c3-330d-5841-b78e-0817d7145fa1

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.16.6+0