The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedcrypto3" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedcrypto3-dbgsym" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls-doc" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls12" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls12-dbgsym" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedx509-0" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedx509-0-dbgsym" } ] }