The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "libmbedcrypto3", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedcrypto3-dbgsym", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedtls-dev", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedtls-doc", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedtls12", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedtls12-dbgsym", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedx509-0", "binary_version": "2.16.4-1ubuntu2" }, { "binary_name": "libmbedx509-0-dbgsym", "binary_version": "2.16.4-1ubuntu2" } ] }