This might be proprietary software.
|2020-03-24||CVE-2020-10941||Arm Mbed TLS before 2.6.15 allows attackers to obtain sensitive information (an RSA private key) by measuring cache usage during an import.||Mbed_crypto, Mbed_tls||N/A|
|2020-01-23||CVE-2019-18222||The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.||Mbed_crypto, Mbed_tls||N/A|
|2019-09-26||CVE-2019-16910||Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)||Mbed_crypto, Mbed_tls, Fedora||N/A|