Note:
This project will be discontinued after December 13, 2021. [more]
2018-06-15
Botan 2.5.0 through 2.6.0 before 2.7.0 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP, related to dsa/dsa.cpp, ec_group/ec_group.cpp, and ecdsa/ecdsa.cpp. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Products | Botan |
Type | Information Exposure (CWE-200) |
First patch |
https://github.com/randombit/botan/commit/48fc8df51d99f9d8ba251219367b3d629cc848e3 |
Relevant file/s |
• ./doc/security.rst (modified, +8)
• ./src/lib/pubkey/dsa/dsa.cpp (modified, +28, -10) • ./src/lib/pubkey/ec_group/ec_group.cpp (modified, +20) • ./src/lib/pubkey/ec_group/ec_group.h (modified, +10) • ./src/lib/pubkey/ecdsa/ecdsa.cpp (modified, +22, -7) |
Links |
• https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
• https://botan.randombit.net/security.html |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: