Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
UBUNTU-CVE-2019-19960
See a problem?
Please try reporting it
to the source
first.
Source
https://ubuntu.com/security/CVE-2019-19960
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-19960.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-19960
Upstream
CVE-2019-19960
Published
2019-12-25T00:15:00Z
Modified
2025-07-18T16:45:33Z
Severity
5.3 (Medium)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Calculator
Ubuntu - medium
Summary
[none]
Details
In wolfSSL before 4.3.0, wc
ecc
mulmod_ex does not properly resist side-channel attacks.
References
https://ubuntu.com/security/CVE-2019-19960
https://github.com/wolfSSL/wolfssl/commit/5ee9f9c7a23f8ed093fe1e42bc540727e96cebb8
https://github.com/wolfSSL/wolfssl/releases/tag/v4.3.0-stable
https://www.cve.org/CVERecord?id=CVE-2019-19960
Affected packages
Ubuntu:Pro:16.04:LTS
/
wolfssl
Package
Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@3.4.8+dfsg-1?arch=source&distro=esm-apps/xenial
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
3.*
3.4.8+dfsg-1
Ubuntu:Pro:18.04:LTS
/
wolfssl
Package
Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@3.13.0+dfsg-1?arch=source&distro=esm-apps/bionic
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
3.*
3.10.2+dfsg-2
3.12.0+dfsg-1
3.12.2+dfsg-1
3.13.0+dfsg-1
UBUNTU-CVE-2019-19960 - OSV