CVE-2023-26556

io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
Configurations

Configuration 1 (hide)

cpe:2.3:a:iofinnet:tss-lib:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:09

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b', 'name': 'https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b', 'tags': ['Not Applicable', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b -

Information

Published : 2023-04-21 18:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-26556

Mitre link : CVE-2023-26556

CVE.ORG link : CVE-2023-26556


JSON object : View

Products Affected

iofinnet

  • tss-lib
CWE
CWE-203

Observable Discrepancy