[arch-security] [ASA-201507-20] crypto++: private key recovery
anthraxx at archlinux.org
Fri Jul 24 14:02:19 UTC 2015
Arch Linux Security Advisory ASA-201507-20
Date : 2015-07-24
CVE-ID : CVE-2015-2141
Package : crypto++
Type : private key recovery
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package crypto++ before version 5.6.2-3 is vulnerable to private key
recovery via a timing side-channel attack.
Upgrade to 5.6.2-3.
# pacman -Syu "crypto++>=5.6.2-3"
The problems have been fixed upstream but no release is available yet.
Evgeny Sidorov discovered that it is possible to recover the private key
when using Rabin-Williams signatures due to a bad interaction with the
blinding value used to mask private key operations. The bad interaction
had to do with the random value not meeting certain Jacobi requirements,
which allows remote attackers to obtain private keys via a timing attack.
A remote attacker is able to take advantage of improper private key
blinding operations to recover private keys via a timing side-channel
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security