An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLSMPIWINDOW_SIZE) used for the exponentiation is 3 or smaller.
{
"binaries": [
{
"binary_version": "2.2.1-2ubuntu0.3",
"binary_name": "libmbedcrypto0"
},
{
"binary_version": "2.2.1-2ubuntu0.3",
"binary_name": "libmbedtls-dev"
},
{
"binary_version": "2.2.1-2ubuntu0.3",
"binary_name": "libmbedtls10"
},
{
"binary_version": "2.2.1-2ubuntu0.3",
"binary_name": "libmbedx509-0"
}
]
}
{
"binaries": [
{
"binary_version": "2.16.4-1ubuntu2",
"binary_name": "libmbedcrypto3"
},
{
"binary_version": "2.16.4-1ubuntu2",
"binary_name": "libmbedtls-dev"
},
{
"binary_version": "2.16.4-1ubuntu2",
"binary_name": "libmbedtls12"
},
{
"binary_version": "2.16.4-1ubuntu2",
"binary_name": "libmbedx509-0"
}
]
}
{
"binaries": [
{
"binary_version": "2.28.0-1build1",
"binary_name": "libmbedcrypto7"
},
{
"binary_version": "2.28.0-1build1",
"binary_name": "libmbedtls-dev"
},
{
"binary_version": "2.28.0-1build1",
"binary_name": "libmbedtls14"
},
{
"binary_version": "2.28.0-1build1",
"binary_name": "libmbedx509-1"
}
]
}