Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 702930 (CVE-2019-14318) - dev-libs/crypto++: vulnerable to private key recovery (CVE-2019-14318)
Summary: dev-libs/crypto++: vulnerable to private key recovery (CVE-2019-14318)
Status: IN_PROGRESS
Alias: CVE-2019-14318
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [upstream cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-12-14 21:38 UTC by GLSAMaker/CVETool Bot
Modified: 2020-08-03 05:15 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2019-12-14 21:38:12 UTC
CVE-2019-14318 (https://nvd.nist.gov/vuln/detail/CVE-2019-14318):
  Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature
  generation. This allows a local or remote attacker, able to measure the
  duration of hundreds to thousands of signing operations, to compute the
  private key used. The issue occurs because scalar multiplication in ecp.cpp
  (prime field curves, small leakage) and algebra.cpp (binary field curves,
  large leakage) is not constant time and leaks the bit length of the scalar
  among other information.
Comment 1 Sam James gentoo-dev Security 2020-05-20 02:51:28 UTC
Based on https://github.com/weidai11/cryptopp/issues/869#issuecomment-568790184, it seems it is not appropriate to apply any patches until a release is made.