GHSA-wj6h-64fc-37mp

Suggest an improvement
Source
https://github.com/advisories/GHSA-wj6h-64fc-37mp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-wj6h-64fc-37mp/GHSA-wj6h-64fc-37mp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wj6h-64fc-37mp
Aliases
Published
2024-01-22T21:35:27Z
Modified
2024-02-19T05:32:07.580278Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Minerva timing attack on P-256 in python-ecdsa
Details

python-ecdsa has been found to be subject to a Minerva timing attack on the P-256 curve. Using the ecdsa.SigningKey.sign_digest() API function and timing signatures an attacker can leak the internal nonce which may allow for private key discovery. Both ECDSA signatures, key generation, and ECDH operations are affected. ECDSA signature verification is unaffected. The python-ecdsa project considers side channel attacks out of scope for the project and there is no planned fix.

References

Affected packages

PyPI / ecdsa

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.18.0

Affected versions

0.*

0.6
0.7
0.8
0.9
0.10
0.11
0.12
0.13
0.13.1
0.13.2
0.13.3
0.14
0.14.1
0.15
0.16.0
0.16.1
0.17.0
0.18.0b1
0.18.0b2
0.18.0

Ecosystem specific

{
    "affected_functions": [
        "ecdsa.SigningKey.sign_digest"
    ]
}